bg
bg

#SupplyChainAttack - Beeble Blog

How a Poisoned Dependency Compromised the OpenAI Build Pipeline
Cyber Security

OpenAI revokes macOS certificates after a North Korean supply chain attack via Axios. Learn how the WAVESHAPER malware targeted the ChatGPT desktop app.

Alexey Drobyshev
Alexey Drobyshev
April 13, 2026
The Strapi Deception: How 36 Malicious npm Packages Targeted Database Infrastructure
Cyber Security

36 malicious npm packages disguised as Strapi plugins were found exploiting Redis and PostgreSQL. Learn how to protect your CI/CD and databases today.

Alexey Drobyshev
Alexey Drobyshev
April 5, 2026
The Ghost in the Machine: How Invisible Unicode is Haunting GitHub Supply Chains
Cyber Security

Researchers find 151 malicious GitHub packages using invisible Unicode to hide code. Learn how this supply-chain attack works and how to protect your code.

Alexey Drobyshev
Alexey Drobyshev
March 15, 2026
bg
bg
bg

See you on the other side.

Our end-to-end encrypted email and cloud storage solution provides the most powerful means of secure data exchange, ensuring the safety and privacy of your data.

/ Create a free account