<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <title>Tenable Blog</title>
    <link>https://www.tenable.com/</link>
    <description/>
    <language>en</language>
    <atom:link href="https://www.tenable.com/blog/feed" rel="self" type="application/rss+xml"/>
    
    <item>
  <title>Beating the Mythos clock: Using Tenable Hexa AI custom agents for automated patching</title>
  <link>https://www.tenable.com/blog/beating-the-mythos-clock-using-tenable-hexa-ai-custom-agents-for-automated-patching</link>
  <description>&lt;p&gt;See how Tenable Hexa AI custom agents empower you to counter machine-speed threats by automating vulnerability remediation. Learn how the Model Context Protocol (MCP) automates execution of risk-driven patching workflows, shifting your strategy from reactive tracking to continuous exposure management.&lt;/p&gt;&lt;div class="blog-see-also"&gt;&lt;div class="col-sm-12"&gt;&lt;h2&gt;Key takeaways&lt;/h2&gt;&lt;ol&gt;&lt;li&gt;Even in previews, powerful AI models like &lt;a href="https://www.tenable.com/blog/claude-mythos-prepare-for-AI-cybersecurity-questions-from-your-board-of-directors" target="_blank"&gt;Claude Mythos&lt;/a&gt; show us how quickly adversaries could weaponize newly discovered vulnerabilities. Traditional, manual patching cycles can’t keep up with machine-speed threats.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Tenable Hexa AI, the agentic engine of the Tenable One Exposure Management Platform, allows you to build custom agents to automate vulnerability prioritization and remediation at machine speed and scale.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Because Tenable Hexa AI uses the Model Context Protocol (MCP), it can function as the orchestration layer linking any LLMs you’re using to your other security tools. In other words, with Tenable Hexa AI, you can use an LLM to trigger vulnerability remediation workflows that leverage custom agents alongside your preferred patching tools to eliminate manual delays and accelerate risk reduction.&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;Frontier AI models like &lt;a href="https://red.anthropic.com/2026/mythos-preview/" target="_blank"&gt;Anthropic’s Claude Mythos&lt;/a&gt; have demonstrated the potential to collapse the window between vulnerability discovery and exploitation from days to hours. In internal testing, Anthropic says Mythos Preview provided a fully functional exploit kit fully autonomously for a 17-year-old remote code execution (RCE) vulnerability within “several hours.”&lt;/p&gt;&lt;p&gt;In an environment where attackers operate at machine speed, traditional 30-day patch cycles and manual ticketing systems are not just slow, they’re a liability.&amp;nbsp;&lt;/p&gt;&lt;p&gt;As Tenable CTO Vlad Korsunsky recently wrote in &lt;a href="https://www.tenable.com/blog/claude-mythos-prepare-for-AI-cybersecurity-questions-from-your-board-of-directors" target="_blank"&gt;a blog on Claude Mythos&lt;/a&gt;, closing your patch gap has never been more critical. &lt;a href="https://www.tenable.com/blog/hexa-ai-agentic-ai-for-exposure-management" target="_blank"&gt;Tenable Hexa AI&lt;/a&gt; is built to close this gap, accelerate exposure and vulnerability remediation cycles from human speed to machine speed, and automate a variety of complex, multi-step security tasks.&amp;nbsp;&lt;/p&gt;&lt;h2&gt;The power of custom Tenable Hexa AI agents&lt;/h2&gt;&lt;p&gt;In our first blog on use cases for the Tenable Hexa AI agentic engine, we showed how you can &lt;a href="https://www.tenable.com/blog/crushing-axios-supply-chain-threat-tenable-hexa-ai-agentic-ai-use-cases" target="_blank"&gt;use Tenable Hexa AI to identify assets impacted by the Axios npm supply chain attack&lt;/a&gt;. While rapid identification and prioritization form the bedrock of exposure management, the sheer volume of modern threats requires teams to scale their response by automating mitigation for the specific risks that actually impact their environment.&lt;/p&gt;&lt;p&gt;Tenable Hexa AI enables you to build custom agents to automate workflows tailored to your unique environment. By utilizing the &lt;a href="https://www.tenable.com/blog/faq-about-model-context-protocol-mcp-and-integrating-ai-for-agentic-applications" target="_blank"&gt;Model Context Protocol (MCP)&lt;/a&gt;, Tenable Hexa AI securely connects large language models (LLMs) like Claude with your internal tech stack and execution tools. With this capability, you aren't just asking an LLM what is vulnerable; you’re mobilizing an agent to fix it.&lt;/p&gt;&lt;h2&gt;Automating vulnerability prioritization and remediation with Tenable Hexa AI&amp;nbsp;&lt;/h2&gt;&lt;p&gt;Let’s look at a real-world workflow where we use an LLM (in this case, Claude) combined with a custom Tenable Hexa AI agent to conduct automated patching and instantly accelerate risk reduction.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Step 1: Command the agent using natural language&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;The workflow begins in Claude with a natural language prompt:&lt;/p&gt;&lt;p&gt;“Use Tenable Vulnerability Management and Tenable Patch Management to identify and patch any critical VPR vulnerabilities on the asset, rsac-svr-2022”&amp;nbsp;&lt;/p&gt;&lt;img class="vidyard-player-embed align-center" src="https://play.vidyard.com/vg72JcFkbP2yd1GKqKPkjT.jpg" alt="Video explaining how Tenable Hexa AI functions as the orchestration layer connecting your preferred LLM to your preferred patching tool," width="100%" height="100%" data-uuid="vg72JcFkbP2yd1GKqKPkjT" data-v="4" data-type="inline" loading="lazy"&gt;&lt;p class="text-align-center"&gt;&lt;em&gt;Tenable Hexa AI functions as the orchestration layer connecting your preferred LLM to your preferred patching tool, allowing you to trigger autonomous actions directly from your LLM.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Step 2: Prompt triggers agentic &lt;/strong&gt;&lt;a href="https://www.tenable.com/products/vulnerability-management/use-cases/prioritization" target="_blank"&gt;&lt;strong&gt;vulnerability prioritization&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The prompt triggers the custom Tenable Hexa AI agent to immediately query Tenable, locate the specific asset, and filter the findings using Tenable’s &lt;a href="https://www.tenable.com/capabilities/vulnerability-priority-rating" target="_blank"&gt;Vulnerability Priority Rating (VPR)&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;&lt;p&gt;In contrast with other vulnerability scoring systems, like &lt;a href="https://www.tenable.com/cybersecurity-guide/principles/common-vulnerability-scoring-system-cvss#vs-other-scoring-models" target="_blank"&gt;CVSS and EPSS&lt;/a&gt;, which score based on theoretical risk and probability of exploitation, the Vulnerability Priority Rating pinpoints the roughly &lt;a href="https://www.tenable.com/whitepapers/enhancements-to-tenable-vulnerability-priority-rating-vpr" target="_blank"&gt;1.6% of vulnerabilities&lt;/a&gt; that actually pose an immediate risk to your organization based on real-world exploitability data and potential business impact.&lt;/p&gt;&lt;p&gt;By using the Tenable Vulnerability Priority Rating as a strict filtering criteria, custom agents can then trigger automated workflows exclusively for your most critical &lt;a href="https://www.tenable.com/cve" target="_blank"&gt;CVEs&lt;/a&gt;.&lt;/p&gt;&lt;img class="vidyard-player-embed" src="https://play.vidyard.com/nWxAjtz2UQnooWbscQQSUy.jpg" alt="Video explaining how simple prompt in Claude triggers a custom Tenable Hexa AI agent to carry out the command" width="100%" height="100%" data-uuid="nWxAjtz2UQnooWbscQQSUy" data-v="4" data-type="inline" loading="lazy"&gt;&lt;p class="text-align-center"&gt;&lt;em&gt;A simple prompt in Claude triggers a custom Tenable Hexa AI agent to carry out the command.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Step 3: Agent automates patch deployment&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Once the true priorities are identified, the Tenable Hexa AI agent directly triggers your patching tool of choice (in this example, &lt;a href="https://www.tenable.com/products/patch-management" target="_blank"&gt;Tenable Patch Management&lt;/a&gt;) to seamlessly deploy the fix to the asset, removing manual delays from the remediation cycle.&lt;/p&gt;&lt;p&gt;To deliver trusted execution alongside machine speed, the Tenable Hexa AI agent relies on Tenable’s &lt;a href="https://www.tenable.com/exposure-management" target="_blank"&gt;Exposure Data Fabric&lt;/a&gt;, the industry’s richest repository of contextualized exposure data. The Exposure Data Fabric maps the interactions among vulnerabilities, identities, and assets to provide the deep environmental context that agents need to take safe, precise action. Limiting network changes strictly to material exposures earns the operational confidence from IT required to successfully scale automated VulnOps workflows.&lt;/p&gt;&lt;p&gt;With custom agents, you maintain total authority over the execution phase. You can build specific human-in-the-loop (HITL) checkpoints directly into the agent’s logic — choosing exactly when to unleash full automated execution and when to require a strategic manual sign-off — allowing you to confidently close the exploit window without risking operational disruption.&lt;/p&gt;&lt;img class="vidyard-player-embed align-center" src="https://play.vidyard.com/qbdJraRJXe6fMcMRkTXD7J.jpg" alt="Video explaining how the Tenable Hexa AI agent automates patch deployment" width="100%" height="100%" data-uuid="qbdJraRJXe6fMcMRkTXD7J" data-v="4" data-type="inline" loading="lazy"&gt;&lt;p class="text-align-center"&gt;&lt;em&gt;The custom Tenable Hexa AI agent automates patch deployment, eliminating manual delays.&lt;/em&gt;&lt;br&gt;&amp;nbsp;&lt;/p&gt;&lt;h2&gt;Scaling vulnerability remediation efforts with agentic AI&amp;nbsp;&lt;/h2&gt;&lt;p&gt;The economics of cyberattacks have fundamentally shifted. With high-level exploits now costing attackers &lt;a href="https://www.helpnetsecurity.com/2026/04/08/anthropic-claude-mythos-preview-identify-vulnerabilities/" target="_blank"&gt;under $2,000 and taking less than one day&lt;/a&gt; to develop, the accelerating volume of AI-discovered vulnerabilities will quickly overwhelm even the most well-resourced security teams. To survive, defenders must shift their economics, too.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Tenable Hexa AI acts as the crucial force multiplier to make that shift possible. By integrating custom AI agents into your security workflows, you reduce the “cost per remediation.” This empowers a single analyst to automate repetitive tasks, efficiently triage patches, and manage exposures at a scale.&lt;/p&gt;&lt;p&gt;Ultimately, establishing these automated remediation pipelines allows defenders to operate at machine speed without burning out. You successfully transition your strategy from reactive tracking to proactive exposure management, permanently closing the gap between how fast vulnerabilities are found and how fast your organization can respond.&lt;/p&gt;&lt;h2&gt;Ready to build your own custom automated workflows and beat the exploit clock?&lt;/h2&gt;&lt;p&gt;Tenable Hexa AI is currently in private preview for select &lt;a href="https://www.tenable.com/products/tenable-one" target="_blank"&gt;Tenable One&lt;/a&gt; customers. Contact your Tenable Account Team to join the private preview program.&lt;/p&gt;&lt;p&gt;&lt;em&gt;Want to learn more? Download the &lt;/em&gt;&lt;a href="https://tenable.com/data-sheets/tenable-hexa-ai-the-agentic-engine-for-tenable-one-exposure-management?_gl=1*1kgfd36*_gcl_au*MTM1OTQwNzA4Ni4xNzc1MjI1NzQ5LjEwNTU3NjQyNS4xNzc1NTA2Mzg2LjE3NzU1MDYzODU.*_ga*MTkxNDcxMTUyLjE3NzUyMjI1Mzc.*_ga_HSJ1XWV6ND*czE3NzYxMDIyODckbzI0JGcxJHQxNzc2MTA1OTk3JGo1OSRsMCRoMTU2NDYxNDAzMQ.." target="_blank"&gt;&lt;em&gt;Tenable Hexa AI data sheet&lt;/em&gt;&lt;/a&gt;&lt;em&gt; to get the full technical breakdown of our agentic capabilities.&lt;/em&gt;&lt;/p&gt;
&lt;img src="https://www.tenable.com/sites/default/files/images/articles/AdobeStock_112185177%20%282%29.jpeg"&gt;
</description>
  <pubDate>Thu, 16 Apr 2026 14:35:00 -0400</pubDate>
    <dc:creator>Ziga Cerkovnik</dc:creator>
    <guid isPermaLink="true">https://www.tenable.com/210847</guid>
    </item>
<item>
  <title>Unlocking foundational visibility for cyber-physical systems with OT vulnerability management</title>
  <link>https://www.tenable.com/blog/ot-vulnerability-management-cyber-physical-systems-cybersecurity</link>
  <description>&lt;p&gt;Stop managing risk in silos. VM-Native OT Discovery, now available in Tenable Vulnerability Management and Tenable Security Center provides unified visibility across IT and OT domains. See every asset and manage your total cyber exposure in a unified view.&lt;/p&gt;&lt;div class="blog-see-also"&gt;&lt;div class="col-sm-12"&gt;&lt;h2&gt;Key takeaways&lt;/h2&gt;&lt;ol&gt;&lt;li&gt;The air gap is dead. IT security teams are inheriting responsibility for operational technology (OT), but often lack visibility into these systems.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Security teams face significant barriers with OT security. Fear of disrupting fragile devices and the high cost of specialized hardware have created a dangerous "black box" in the attack surface.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;The perfect “on-ramp” to OT security. A new OT Discovery engine embedded in Tenable Vulnerability Management and Tenable Security Center allows security teams to safely profile OT, IoT, and shadow IT assets using the tools they already own.&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;For decades, the concept of the "air gap" — a physical isolation between IT networks and critical &lt;a href="https://www.tenable.com/principles/operational-technology-principles"&gt;operational technology&lt;/a&gt; (OT) — provided security leaders with a sense of comfort. The assumption was simple. Digital threats stay on the corporate network, while physical operations run safely in isolation.&lt;/p&gt;&lt;p&gt;In today's hyper-connected world, that assumption is often wrong and leaves your OT environment exposed to preventable cyber risk.&lt;/p&gt;&lt;p&gt;From modern data centers and smart hospitals to commercial real estate and universities, the line between the digital and the physical has blurred. IT security teams are increasingly inheriting responsibility for securing &lt;a href="https://www.tenable.com/blog/how-to-unlock-advanced-iot-visibility-for-cyber-physical-systems"&gt;cyber-physical systems &lt;/a&gt;(CPS) — the HVAC controllers keeping servers cool, the badge readers securing facility entrances, and the power distribution units keeping the lights on.&lt;/p&gt;&lt;p&gt;Yet, for many organizations, these OT assets are a massive blind spot.&lt;/p&gt;&lt;h2&gt;The "black box" problem&lt;/h2&gt;&lt;p&gt;While &lt;a href="https://www.tenable.com/solutions/vulnerability-management"&gt;vulnerability management&lt;/a&gt; programs have matured rapidly for IT assets, covering everything from cloud workloads to laptops, operational environments are often a "black box."&lt;/p&gt;&lt;p&gt;This visibility gap usually stems from two distinct barriers:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;There is a pervasive (and historically valid) fear that scanning OT/IoT assets with traditional IT security tools could knock fragile devices offline, &lt;strong&gt;disrupting critical business operations&lt;/strong&gt;.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Traditional &lt;a href="https://www.tenable.com/source/operational-technology"&gt;OT security&lt;/a&gt; tools often require a massive undertaking. The &lt;strong&gt;complexity and cost&lt;/strong&gt; of deploying expensive specialized hardware, managing long-term evaluations, architecting complex mirror ports, and navigating the political minefield of installing new appliances in sensitive production environments make these projects difficult to justify.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The result is a dangerous paradox. Security teams are responsible for the risk of interconnected systems, but don’t have the tools to see or secure them. Attackers, however, face no such barriers, frequently pivoting from compromised IT networks to poorly defended OT assets to maximize impact.&lt;/p&gt;&lt;h2&gt;Rethinking converged OT/IT security&lt;/h2&gt;&lt;p&gt;To secure the modern attack surface, organizations must stop &lt;a href="https://www.tenable.com/solutions/it-ot"&gt;managing IT and OT&lt;/a&gt; risk in silos. Security leaders need a unified view that treats a vulnerability on a programmable logic controller (PLC) with the same rigor and context as a vulnerability on a Windows server.&lt;/p&gt;&lt;p&gt;Achieving this requires a fundamental shift in how we approach &lt;a href="http://tenable.com/products/vulnerability-management/use-cases/asset-discovery"&gt;asset discovery&lt;/a&gt;. Security teams need streamlined methods that provide the necessary depth of OT visibility for compliance and risk reduction, without the friction of deploying hardware across physical sites. They need a way to safely seeshadow OT assets using the infrastructure already in place.&lt;br&gt;&amp;nbsp;&lt;/p&gt;&lt;img src="https://www.tenable.com/sites/default/files/inline/images/Tenable%E2%80%99s%20research%20and%20testing%20lab%20for%20operational%20technology_0.jpg" data-entity-uuid="675ab1d6-790f-4d01-9c5f-f5eca1bd23b4" data-entity-type="file" alt="Tenable’s research and testing lab for operational technology (OT)" width="1200" height="675" class="align-center" loading="lazy"&gt;&lt;p class="text-align-center"&gt;&lt;em&gt;&lt;sup&gt;Image: A segment of Tenable’s research and testing lab for operational technology (OT).&lt;/sup&gt;&lt;/em&gt;&lt;/p&gt;&lt;h2&gt;Introducing VM-Native OT Discovery&lt;/h2&gt;&lt;p&gt;Our latest release fundamentally changes the economics and accessibility of &lt;a href="https://www.tenable.com/products/ot-security"&gt;OT security tools&lt;/a&gt;. We are excited to announce &lt;strong&gt;OT Discovery&lt;/strong&gt;, a new capability embedded directly inside the &lt;a href="https://www.tenable.com/products/tenable-one"&gt;Tenable One Exposure Management Platform&lt;/a&gt; that provides security teams with foundational visibility into OT and IoT environments. It’s the perfect on-ramp to OT security, so you can uncover hidden OT risks and deep asset-level details.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Here is how it changes the game for your security program:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Safe visibility for cyber-physical systems.&lt;/strong&gt; OT Discovery uses the same Active Query engine found in our specialized Tenable &lt;a href="https://www.tenable.com/solutions/it-ot"&gt;OT Security solution&lt;/a&gt;—now natively integrated into &lt;a href="https://www.tenable.com/products/vulnerability-management"&gt;Tenable Vulnerability Management&lt;/a&gt; and &lt;a href="https://www.tenable.com/products/tenable-one"&gt;Tenable One&lt;/a&gt;. It performs "smart," protocol-aware handshakes to verify assets before querying them so you can safely profile PLCs, human-machine interfaces (HMIs), &lt;a href="https://youtube.com/shorts/GVAVruXRqUE?si=VhO49qLi_7mM07lL"&gt;IoT devices&lt;/a&gt;, and shadow IT assets across your environment.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Unified OT/IT &lt;/strong&gt;&lt;a href="https://www.tenable.com/exposure-management"&gt;&lt;strong&gt;exposure management&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;.&lt;/strong&gt; By integrating OT asset data, including vendor, model, and firmware details, directly into your existing dashboards, you can break down silos and view your organization's total risk exposure in a single pane of glass.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Extend the value of your security investments.&lt;/strong&gt; No need to rip and replace or install new hardware. This capability enables you to extend the value of your existing vulnerability management toolsets to uncover the OT risk hiding on your network.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Breaking down silos across IT and OT&lt;/h2&gt;&lt;p&gt;Adopting a unified approach to OT/IT &lt;a href="https://www.tenable.com/products/tenable-one"&gt;exposure management&lt;/a&gt; builds trust.&lt;/p&gt;&lt;p&gt;Historically, the relationship between IT security and facility operations teams has been strained. IT wants to scan and patch known vulnerabilities. Operations teams require uptime and stability. When IT security teams try to enter the OT space with aggressive scans or unfamiliar hardware, friction is inevitable.&lt;/p&gt;&lt;p&gt;VM-Native OT Discovery changes the conversation. Because Tenable relies on trusted, safe query methods through familiar infrastructure, the security team can approach the ops team with reliable data and real-time exposure intelligence.&lt;/p&gt;&lt;p&gt;Instead of asking, &lt;em&gt;"Can we install a black box on your network?"&lt;/em&gt; you can say, &lt;em&gt;"We noticed three unmanaged PLCs communicating on the subnet. Here is exactly what they are. Let’s work together to secure them now rather than waiting 6-12 months to patch during the next maintenance interval."&lt;/em&gt;&lt;/p&gt;&lt;h2&gt;Get started with OT security today&lt;/h2&gt;&lt;p&gt;OT security is no longer just for industrial giants and organizations managing critical national infrastructure. Every manufacturer, warehouse operator, and organizations smart building management systems face operational risk.&lt;/p&gt;&lt;p&gt;Ready to get visibility into your OT blind spots? You don't need a massive budget or a year-long deployment project to get started. Watch this quick demo to see how you can secure your most critical assets with the vulnerability management tools you already use.&lt;br&gt;&amp;nbsp;&lt;/p&gt;&lt;div&gt;&lt;div class="sl-embed"&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;&lt;br&gt;&lt;em&gt;Are you an existing Tenable customer?&lt;/em&gt; &lt;em&gt;Explore the user guide documentation for &lt;/em&gt;&lt;a href="https://docs.tenable.com/vulnerability-management/Content/Scans/Templates.htm"&gt;&lt;em&gt;Scan Templates&lt;/em&gt;&lt;/a&gt;&lt;em&gt; and &lt;/em&gt;&lt;a href="https://docs.tenable.com/vulnerability-management/Content/Scans/DiscoverySettings.htm#Host"&gt;&lt;em&gt;Discovery Settings&lt;/em&gt;&lt;/a&gt;&lt;em&gt; to get started.&lt;/em&gt;&lt;/p&gt;&lt;h2&gt;Learn more&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Dive deeper into the challenges and solutions for securing OT with our eBook, “&lt;a href="https://www.tenable.com/whitepapers/blackbox-to-blueprint-the-security-leaders-guidebook-to-managing-ot-and-it-risk"&gt;&lt;strong&gt;Blackbox to blueprint: A security leader’s guide to managing OT and IT risk&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;.”&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Explore our complete &lt;a href="https://www.tenable.com/products/tenable-one"&gt;&lt;strong&gt;Tenable One exposure management platform&lt;/strong&gt;&lt;/a&gt;, offering scalable security solutions for the entire attack surface.&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.tenable.com/products/tenable-one/evaluate"&gt;&lt;strong&gt;Request a demo&lt;/strong&gt;&lt;/a&gt; to find out how Tenable exposure management solutions fit into your cybersecurity roadmap.&lt;/li&gt;&lt;/ul&gt;
&lt;img src="https://www.tenable.com/sites/default/files/images/articles/Unlocking%20Foundational%20Visibility%20for%20Cyber-Physical%20Systems%20with%20OT%20Vulnerability%20Management.jpeg"&gt;
</description>
  <pubDate>Wed, 15 Apr 2026 08:50:00 -0400</pubDate>
    <dc:creator>Anthony Johnson</dc:creator>
    <guid isPermaLink="true">https://www.tenable.com/210721</guid>
    </item>
<item>
  <title>Claude Mythos: Prepare for your board’s cybersecurity questions about the latest AI model from Anthropic</title>
  <link>https://www.tenable.com/blog/claude-mythos-prepare-for-AI-cybersecurity-questions-from-your-board-of-directors</link>
  <description>&lt;div class="blog-see-also"&gt;&lt;div class="col-sm-12"&gt;&lt;p&gt;With the Federal Reserve Chairman meeting with bank CEOs to discuss the security implications of Claude Mythos, you can bet that your board of directors will ask you about the impact of the AI model on your cybersecurity strategy. Here’s how to prepare.&amp;nbsp;&lt;/p&gt;&lt;h2&gt;Key takeaways&lt;/h2&gt;&lt;ol&gt;&lt;li&gt;Anthropic announced Claude Mythos Preview, its most powerful general-purpose frontier model to date, and highlighted its exceptional ability to find software vulnerabilities that no human vulnerability research had previously discovered.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;With Claude Mythos continuing to dominate traditional news and social media, your board of directors will have questions for you about the impact of the new AI model on your cybersecurity strategy and risk posture.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;As the pace of vulnerability discovery accelerates with the use of frontier models like Claude Mythos, exposure management can help organizations quickly, continuously, and autonomously assess if they’re impacted by these vulnerabilities, evaluate the risk they pose, and orchestrate remediation.&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;On April 7, 2026, Anthropic unveiled &lt;a href="https://red.anthropic.com/2026/mythos-preview/"&gt;Claude Mythos Preview&lt;/a&gt;, its most powerful frontier model to date and one that excels at cybersecurity tasks, specifically, vulnerability discovery in code. (I previously wrote about &lt;a href="https://www.tenable.com/blog/Anthropic-Claude-Opus-AI-vulnerability-discovery-cybersecurity"&gt;Claude Opus 4.6&lt;/a&gt; and its impact on cybersecurity.)&lt;/p&gt;&lt;p&gt;I’ll spare you the details of the decades-old, zero-day vulnerabilities that Claude Mythos proved capable of finding and exploiting in internal testing, as I’m sure you’re already aware. But suffice it to say the model was so powerful, Anthropic thought it prudent to assemble a group of technology partners in an initiative called &lt;a href="https://www.anthropic.com/glasswing"&gt;Project Glasswing&lt;/a&gt; to apply Mythos’ capabilities to defensive security.&lt;/p&gt;&lt;p&gt;And now, with &lt;a href="https://www.cbsnews.com/news/mythos-anthropic-ai-cybersecurity-risks-powell-bessent/"&gt;Federal Reserve Chairman Jerome Powell meeting with leaders of the largest U.S. banks&lt;/a&gt; to discuss the cybersecurity implications of this mythic new model, you can bet that your board of directors and executive management team will have questions for you about Claude Mythos at the next quarterly meeting — or sooner.&amp;nbsp;&lt;/p&gt;&lt;p&gt;We’re here to help you provide answers.&amp;nbsp;&lt;/p&gt;&lt;h2&gt;The question every board will ask about Claude Mythos&lt;/h2&gt;&lt;p&gt;When it’s time for your 15-minute cyber update, your board of directors will inevitably ask you, “&lt;strong&gt;What are you doing about Claude Mythos? &lt;/strong&gt;How are you preparing for a world in which AI-assisted attackers can find and exploit vulnerabilities in minutes?”&lt;/p&gt;&lt;p&gt;Essentially, your board-friendly answer needs to be, “We’re fighting fire with fire. We’re transforming our security operations with agentic AI so that we can autonomously and preemptively find and fix our exposures at machine speed.” You can then report on the number of security workflows you’ve automated with AI and the increases in efficiency and effectiveness that you’re achieving as a result.&lt;/p&gt;&lt;p&gt;Depending on your board’s security savvy, you may need to address how you’re &lt;a href="https://www.tenable.com/blog/what-it-takes-to-start-the-exposure-management-journey"&gt;evolving your vulnerability management function&lt;/a&gt; to handle this new reality of AI-driven vulnerability discovery.&amp;nbsp;&lt;/p&gt;&lt;p&gt;One new approach that forward-leaning security leaders have begun implementing is &lt;a href="https://www.tenable.com/exposure-management/leadership-council"&gt;exposure management&lt;/a&gt;, or &lt;a href="https://www.tenable.com/cybersecurity-guide/learn/what-is-ctem"&gt;CTEM&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;&lt;h2&gt;What is exposure management?&amp;nbsp;&lt;/h2&gt;&lt;p&gt;Exposure management is a strategic approach to preemptive security designed to reduce cyber risk. It continuously assesses, prioritizes, and remediates your organization’s most critical cyber exposures. Cyber exposures are toxic combinations of preventable cyber risks (such as vulnerabilities, misconfigurations, and excessive permissions) that give threat actors a path to your most sensitive systems and data.&lt;/p&gt;&lt;p&gt;By continually and agentically assessing, prioritizing, and remediating risks, exposure management provides the answer to the question of how to build a &lt;a href="https://labs.cloudsecurityalliance.org/mythos-ciso/"&gt;“Mythos-ready” security program&lt;/a&gt;. It offers the solution to the single biggest challenge associated with AI-vulnerability discovery: how security and remediation teams will address the massive backlog of findings that AI-assisted vulnerability discovery will create.&amp;nbsp;&lt;/p&gt;&lt;h2&gt;Exposure management is a “Mythos-ready” security program&lt;/h2&gt;&lt;p&gt;To understand the role exposure management plays in a world flooded with AI-driven vulnerability discoveries, it’s important to understand the difference between frontier models and exposure management solutions.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What frontier models do:&lt;/strong&gt; Claude Code Security and Mythos Preview read and reason about source code. They identify logic flaws, memory corruption vulnerabilities, injection weaknesses, and authentication bypasses by tracing data flows and understanding how software components interact. Mythos does this with extraordinary autonomy and can chain vulnerabilities into working exploits. &lt;strong&gt;Fundamentally, this is application security:&lt;/strong&gt; static and dynamic analysis of codebases operating at the source-code layer.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What exposure management does: &lt;/strong&gt;Exposure management allows you to discover every asset across your environment (IT, cloud, identity, AI, and OT); determine whether they’re vulnerable; prioritize exposures based on business and technical context; orchestrate staged remediation; and validate that fixes are closed. An individual vulnerability may not appear dangerous until it forms an attack chain leading to a critical system. Exposure management helps you see individual vulnerabilities in context and how they combine to create high-risk attack paths.&lt;/p&gt;&lt;p&gt;Bottom line: Frontier models and exposure management operate in categorically different domains and solve fundamentally different problems.&amp;nbsp;&lt;/p&gt;&lt;h2&gt;Exposure management and the preemptive security lifecycle&lt;/h2&gt;&lt;p&gt;To put a finer point on the difference between frontier models and exposure management, let’s examine the complete preemptive security lifecycle that enterprises require. Frontier AI — even at Mythos-class capability — addresses only the first stage of this lifecycle. Exposure management addresses everything else.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Stage 1 — Software vulnerability discovery.&lt;/strong&gt; Identifying that a flaw exists in software. This is where frontier models excel. Mythos has demonstrated extraordinary capability here, finding bugs that survived decades of human review and millions of automated test runs. This capability is genuine and consequential.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Stage 2 — Asset discovery.&lt;/strong&gt; Employing multiple discovery methods, including scanners, agents, OT-specific sensors, and more, to identify every asset in an enterprise: endpoints, servers, cloud workloads, containers, network devices, OT/ICS assets, identity objects, AI applications, MCP servers. This is something Mythos can’t do.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Stage 3 — Assessment.&lt;/strong&gt; Determining whether specific deployed assets are affected by specific vulnerabilities. This requires deep interrogation of the asset: connecting to live systems, parsing configurations, checking patch levels, inspecting running services across IT, cloud, OT, and identity environments at enterprise scale — and doing so without impairing the performance of the live asset. A model that found a Linux kernel vulnerability cannot determine which of an organization's 50,000 Linux hosts are running the affected version without sensor-level access.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Stage 4 — Prioritization.&lt;/strong&gt; This stage becomes more critical, not less, in an AI-accelerated world. When frontier models can discover thousands of new vulnerabilities in weeks and generate working exploits on demand, the volume flowing into the remediation pipeline explodes, but the operational constraints don’t change. Enterprises still have finite maintenance windows, change management processes, compatibility dependencies, and business continuity requirements. Patching 40,000+ CVEs simultaneously across 100,000 assets is not operationally feasible. The math only works with the intelligent prioritization that exposure management provides.&lt;/p&gt;&lt;h2&gt;4 steps to building a Mythos-ready security program: How Tenable can help&lt;/h2&gt;&lt;p&gt;In a recent blog, Anthropic offered several recommendations to &lt;a href="https://claude.com/blog/preparing-your-security-program-for-ai-accelerated-offense"&gt;prepare your security program for an AI-accelerated offense&lt;/a&gt;. Here’s how Tenable can help you strengthen your organization’s cybersecurity posture and reduce your risk in the age of AI-driven attacks:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;1 - “Close your patch gap.” &lt;/strong&gt;Anthropic says to patch everything in the CISA KEV immediately, use EPSS to prioritize the rest, and automate deployment. In theory, this advice makes sense. In practice, it’s a bit misguided.&amp;nbsp;&lt;/p&gt;&lt;p&gt;For one thing, even if you patched everything in the CISA KEV immediately, you’d still have gaps. The &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog"&gt;CISA KEV catalog&lt;/a&gt; operates off of strict inclusion criteria, so just because a CVE hasn’t landed in the KEV doesn’t mean it’s less critical. On the contrary, Tenable Research is currently tracking 201 CVEs that are being actively exploited in the wild, yet that aren’t part of the KEV. The Citrix Session Recording Vulnerability (&lt;a href="https://www.tenable.com/cve/CVE-2024-8069"&gt;CVE-2024-8069&lt;/a&gt;) provides an example of a CVE for which Tenable Research issued a watch designation nearly a full year (286 days) before it hit the KEV.&lt;/p&gt;&lt;p&gt;Then there’s the issue of prioritization. With the vulnerability discovery capabilities of Mythos falling into the wrong hands, the number of vulnerabilities could grow by 10X or more. As Tenable Co-CEO Steve Vintz pointed out in a &lt;a href="https://www.linkedin.com/posts/steve-vintz-a6601b9_this-weeks-unveiling-of-project-glasswing-activity-7448471470751518720-Iyt6/?utm_source=share&amp;amp;utm_medium=member_desktop&amp;amp;rcm=ACoAAAFjTacB3vTEyYPJ75KqQBzcdl5bCuRqIVc"&gt;recent LinkedIn post&lt;/a&gt;, “Prioritization is no longer optional. It’s survival.”&amp;nbsp;&lt;/p&gt;&lt;p&gt;But prioritizing based on EPSS alone will leave you chasing your tail. EPSS prioritizes based only on probability of exploitation. In contrast, Tenable One provides much finer-grained prioritization than both &lt;a href="https://www.tenable.com/webinars/the-prioritization-puzzle-cvss-vs-epss-vs-vpr"&gt;EPSS and CVSS&lt;/a&gt;. Through the proprietary &lt;a href="https://www.tenable.com/capabilities/vulnerability-priority-rating"&gt;Vulnerability Priority Rating (VPR)&lt;/a&gt;, Tenable uses machine learning to narrow the 60% of CVEs flagged as critical or high by CVSS to the &lt;a href="https://www.tenable.com/whitepapers/enhancements-to-tenable-vulnerability-priority-rating-vpr"&gt;1.6% that create actual risk&lt;/a&gt; for your organization. Tenable One additionally factors other criteria into its prioritization engine, including reachability (is this asset actually exposed through the network topology?), identity context (what permissions does a compromised asset inherit? does it create a path to domain admin?), business criticality (is this a revenue-generating system or a development sandbox?), and attack path analysis. Answering those questions requires cross-domain telemetry at a scale and specificity that no external model possesses and that only Tenable One can provide.&lt;/p&gt;&lt;p&gt;Finally, more vulnerabilities means more to patch, even as your patching constraints remain the same: you still have to sort through compatibility dependencies and business continuity requirements, among other things. Tenable One gives you the speed, scale, automation, and control to manage your entire update lifecycle. You can deploy&lt;a href="https://www.tenable.com/products/patch-management"&gt; autonomous patching&lt;/a&gt; across &lt;a href="https://docs.tenable.com/release-notes/Content/patch-management/2025.htm"&gt;20,000+ products and 250,000+&lt;/a&gt; unique patches spanning Windows, Linux, and macOS while using customizable controls to test patches and prevent deployment of problematic updates.&amp;nbsp;&lt;/p&gt;&lt;p&gt;And our newly announced agentic AI engine, &lt;a href="https://www.tenable.com/blog/hexa-ai-agentic-ai-for-exposure-management"&gt;Tenable Hexa AI&lt;/a&gt;, will automate asset discovery, tagging, triage, prioritization, and remediation workflows so that your organization can keep pace as vulnerability discovery escalates.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;2 - “Prepare for much higher vulnerability volume.” &lt;/strong&gt;Tenable has a proven track record when it comes to developing and releasing &lt;a href="https://www.tenable.com/plugins"&gt;plugins&lt;/a&gt; to identify new vulnerabilities. We deliver over 100 new plugins each week and, because we use AI to accelerate the speed and scale of plugin development, in general, we can deliver fully automated plugin coverage within &lt;a href="https://docs.tenable.com/pdfs/tenable-vulnerability-coverage-timelines.pdf"&gt;12 to 24 hours&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;&lt;p&gt;When a plugin assesses whether a server is missing a specific patch, it returns a clear, binary, deterministic answer (yes or no) with six-sigma accuracy (0.32 defects per million scans). This precision underpins every downstream decision: whether to open a remediation ticket, whether to take a production system offline, whether to report a finding to an auditor, whether to trigger a staged patch deployment.&lt;/p&gt;&lt;p&gt;In contrast, frontier AI models are probabilistic by design. &lt;a href="https://www-cdn.anthropic.com/3edfc1a7f947aa81841cf88305cb513f184c36ae.pdf"&gt;Anthropic's own documentation&lt;/a&gt; for Mythos reveals the model occasionally attempts to conceal its methods, circumvent sandboxes, and produce inconsistent outputs. Running the same prompt twice can yield different results. For code-level security research, this variability is tolerable — a human researcher reviews and validates findings. But for operational vulnerability management at enterprise scale, where tens of thousands of assets are assessed continuously and findings flow directly into compliance reporting and remediation workflows, probabilistic output is not acceptable.&lt;/p&gt;&lt;p&gt;Compliance frameworks like SOC 2, FedRAMP, PCI-DSS, HIPAA, and FISMA require reproducible, auditable assessment results. Cyber insurance underwriters require them. Board-level risk reporting requires them.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The deterministic scanning foundation that Tenable has built over 24 years — with more than 318,000 &lt;a href="https://www.tenable.com/plugins"&gt;plugins&lt;/a&gt; — is not a legacy artifact. It’s a structural requirement of the market Tenable serves.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;3 - “Reduce and inventory what you expose.” &lt;/strong&gt;Tenable One sensors — scanners, endpoint agents, passive network monitors, web application scanners, OT-specific sensors, identity directory connectors, and cloud API integrations — are designed to discover every asset across live enterprise environments and deterministically assess whether deployed systems are vulnerable. The Tenable One platform then prioritizes exposures based on runtime exploitability context, orchestrates staged remediation, and validates that fixes are closed. Tenable's sensors continuously discover assets across environments that are heterogeneous, distributed, and often air-gapped. We can even assess your shadow AI footprint. A model cannot discover what it cannot reach.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;4 - “Design for breach.” &lt;/strong&gt;The attack path analysis capabilities of Tenable One provide visibility into how threat actors chain together vulnerabilities, misconfigurations, and excessive permissions to reach your critical assets. This attack path mapping enables you to proactively close those gaps and preemptively disrupt the attacker’s journey.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Tenable One can also help you implement zero trust by mapping assets and identities across your environment, showing how they’re connected, and where trust boundaries are. It also adds governance for your fastest growing risk surface: AI agents with admin-level access.&amp;nbsp;&lt;/p&gt;&lt;h2&gt;Navigating the new era of AI-driven risk&lt;/h2&gt;&lt;p&gt;The arrival of Claude Mythos marks a fundamental shift in the cyber landscape, where the speed of vulnerability discovery is now measured in minutes rather than months. While this “mythic” new model provides attackers with an unprecedented ability to find and chain exploits, it also serves as a catalyst for organizations to modernize their defense.&lt;/p&gt;&lt;p&gt;To stay ahead, security leaders must move beyond traditional methods and embrace exposure management. By integrating the deterministic precision of Tenable One with the automated power of Tenable Hexa AI, your organization will be able to transform its security operations into an agentic, preemptive force capable of moving at machine speed.&lt;/p&gt;&lt;p&gt;Don't let the coming flood of AI-generated vulnerabilities overwhelm your team. By focusing on intelligent prioritization, closing your patch gaps, and gaining full visibility into your attack paths, you can confidently answer your board’s toughest questions and build a truly “Mythos-ready” security program.&lt;/p&gt;&lt;p&gt;&lt;em&gt;Forward-Looking Statements&lt;/em&gt;&lt;/p&gt;&lt;p&gt;This blog post contains "forward-looking statements" within the meaning of the federal securities laws, including statements regarding the potential impact of LLMs like Mythos on the cybersecurity landscape and our expectations for the future of Exposure Management. These statements involve risks and uncertainties that could cause actual results to differ materially, including the risks and uncertainties described in our most recent Annual Report on Form 10-K and other SEC filings from time to time. All forward-looking statements in this blog post are based on information available to Tenable as of the date of this post. Tenable assumes no obligation to update any forward-looking statements contained in this post.&lt;/p&gt;&lt;h2&gt;Learn more&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://www.tenable.com/cybersecurity-guide/learn/what-is-exposure-management"&gt;What is Exposure Management&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.tenable.com/cybersecurity-guide/learn/attack-path-analysis-apa"&gt;Attack Path Analysis&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.tenable.com/products/attack-surface-management"&gt;Attack Surface Management&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.tenable.com/products/patch-management"&gt;Tenable Patch Management&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.tenable.com/cybersecurity-guide/learn/what-is-cyber-hygiene"&gt;Cyber Hygiene Best Practices&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;img src="https://www.tenable.com/sites/default/files/images/articles/Claude%20Mythos%20Prepare%20for%20your%20board%E2%80%99s%20cybersecurity%20questions%20about%20the%20latest%20AI%20model%20from%20Anthropic.png"&gt;
</description>
  <pubDate>Tue, 14 Apr 2026 16:45:00 -0400</pubDate>
    <dc:creator>Vlad Korsunsky</dc:creator>
    <guid isPermaLink="true">https://www.tenable.com/210842</guid>
    </item>
<item>
  <title>Microsoft’s April 2026 Patch Tuesday Addresses 163 CVEs (CVE-2026-32201)</title>
  <link>https://www.tenable.com/blog/microsofts-april-2026-patch-tuesday-addresses-163-cves-cve-2026-32201</link>
  <description>&lt;ol class="blog-severity-badges"&gt;&lt;li class="blog-severity-badges critical"&gt;&lt;span class="number"&gt;8&lt;/span&gt;Critical&lt;/li&gt;&lt;li class="blog-severity-badges important"&gt;&lt;span class="number"&gt;154&lt;/span&gt;Important&lt;/li&gt;&lt;li class="blog-severity-badges moderate"&gt;&lt;span class="number"&gt;1&lt;/span&gt;Moderate&lt;/li&gt;&lt;li class="blog-severity-badges low"&gt;&lt;span class="number"&gt;0&lt;/span&gt;Low&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;strong&gt;Microsoft addresses 163 CVEs in the April 2026 Patch Tuesday release, including two zero-day vulnerabilities, one of which was exploited in the wild.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Microsoft patched 163 CVEs in its April 2026 Patch Tuesday release, with eight rated critical, 154 rated as important and one rated as moderate. This is the second largest Patch Tuesday release, nearing the record set by the &lt;a href="https://www.tenable.com/blog/microsofts-october-2025-patch-tuesday-addresses-167-cves-cve-2025-24990-cve-2025-59230"&gt;&lt;u&gt;October 2025 Patch Tuesday&lt;/u&gt;&lt;/a&gt; release with 167 CVEs. Our counts omitted two non-Microsoft CVEs from this month's release.&lt;/p&gt;&lt;img src="https://www.tenable.com/sites/default/files/images/blog/41805b11-7caa-4629-bf58-c333f06c0b6d.png" alt="A pie chart showing the severity distribution across the Patch Tuesday CVEs patched in April 2026." width="865" height="473" referrerpolicy="no-referrer" loading="lazy"&gt;&lt;p&gt;This month’s update includes patches for:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;.NET&lt;/li&gt;&lt;li&gt;.NET and Visual Studio&lt;/li&gt;&lt;li&gt;.NET Framework&lt;/li&gt;&lt;li&gt;.NET,.NET Framework, Visual Studio&lt;/li&gt;&lt;li&gt;Applocker Filter Driver (applockerfltr.sys)&lt;/li&gt;&lt;li&gt;Azure Logic Apps&lt;/li&gt;&lt;li&gt;Azure Monitor Agent&lt;/li&gt;&lt;li&gt;Desktop Window Manager&lt;/li&gt;&lt;li&gt;Function Discovery Service (fdwsd.dll)&lt;/li&gt;&lt;li&gt;GitHub Copilot and Visual Studio Code&lt;/li&gt;&lt;li&gt;Microsoft Brokering File System&lt;/li&gt;&lt;li&gt;Microsoft Defender&lt;/li&gt;&lt;li&gt;Microsoft Dynamics 365 (on-premises)&lt;/li&gt;&lt;li&gt;Microsoft Edge (Chromium-based)&lt;/li&gt;&lt;li&gt;Microsoft Graphics Component&lt;/li&gt;&lt;li&gt;Microsoft High Performance Compute Pack (HPC)&lt;/li&gt;&lt;li&gt;Microsoft Management Console&lt;/li&gt;&lt;li&gt;Microsoft Office&lt;/li&gt;&lt;li&gt;Microsoft Office Excel&lt;/li&gt;&lt;li&gt;Microsoft Office PowerPoint&lt;/li&gt;&lt;li&gt;Microsoft Office SharePoint&lt;/li&gt;&lt;li&gt;Microsoft Office Word&lt;/li&gt;&lt;li&gt;Microsoft Power Apps&lt;/li&gt;&lt;li&gt;Microsoft PowerShell&lt;/li&gt;&lt;li&gt;Microsoft Windows&lt;/li&gt;&lt;li&gt;Microsoft Windows Search Component&lt;/li&gt;&lt;li&gt;Microsoft Windows Speech&lt;/li&gt;&lt;li&gt;Remote Desktop Client&lt;/li&gt;&lt;li&gt;Role: Windows Hyper-V&lt;/li&gt;&lt;li&gt;SQL Server&lt;/li&gt;&lt;li&gt;Universal Plug and Play (upnp.dll)&lt;/li&gt;&lt;li&gt;Windows Active Directory&lt;/li&gt;&lt;li&gt;Windows Admin Center&lt;/li&gt;&lt;li&gt;Windows Advanced Rasterization Platform&lt;/li&gt;&lt;li&gt;Windows Ancillary Function Driver for WinSock&lt;/li&gt;&lt;li&gt;Windows Biometric Service&lt;/li&gt;&lt;li&gt;Windows BitLocker&lt;/li&gt;&lt;li&gt;Windows Boot Loader&lt;/li&gt;&lt;li&gt;Windows Boot Manager&lt;/li&gt;&lt;li&gt;Windows Client Side Caching driver (csc.sys)&lt;/li&gt;&lt;li&gt;Windows Cloud Files Mini Filter Driver&lt;/li&gt;&lt;li&gt;Windows COM&lt;/li&gt;&lt;li&gt;Windows Common Log File System Driver&lt;/li&gt;&lt;li&gt;Windows Container Isolation FS Filter Driver&lt;/li&gt;&lt;li&gt;Windows Cryptographic Services&lt;/li&gt;&lt;li&gt;Windows Encrypting File System (EFS)&lt;/li&gt;&lt;li&gt;Windows File Explorer&lt;/li&gt;&lt;li&gt;Windows GDI&lt;/li&gt;&lt;li&gt;Windows Hello&lt;/li&gt;&lt;li&gt;Windows HTTP.sys&lt;/li&gt;&lt;li&gt;Windows IKE Extension&lt;/li&gt;&lt;li&gt;Windows Installer&lt;/li&gt;&lt;li&gt;Windows Kerberos&lt;/li&gt;&lt;li&gt;Windows Kernel&lt;/li&gt;&lt;li&gt;Windows Kernel Memory&lt;/li&gt;&lt;li&gt;Windows Local Security Authority Subsystem Service (LSASS)&lt;/li&gt;&lt;li&gt;Windows LUAFV&lt;/li&gt;&lt;li&gt;Windows Management Services&lt;/li&gt;&lt;li&gt;Windows OLE&lt;/li&gt;&lt;li&gt;Windows Print Spooler Components&lt;/li&gt;&lt;li&gt;Windows Projected File System&lt;/li&gt;&lt;li&gt;Windows Push Notifications&lt;/li&gt;&lt;li&gt;Windows Recovery Environment Agent&lt;/li&gt;&lt;li&gt;Windows Redirected Drive Buffering&lt;/li&gt;&lt;li&gt;Windows Remote Desktop&lt;/li&gt;&lt;li&gt;Windows Remote Desktop Licensing Service&lt;/li&gt;&lt;li&gt;Windows Remote Procedure Call&lt;/li&gt;&lt;li&gt;Windows RPC API&lt;/li&gt;&lt;li&gt;Windows Sensor Data Service&lt;/li&gt;&lt;li&gt;Windows Server Update Service&lt;/li&gt;&lt;li&gt;Windows Shell&lt;/li&gt;&lt;li&gt;Windows Snipping Tool&lt;/li&gt;&lt;li&gt;Windows Speech Brokered Api&lt;/li&gt;&lt;li&gt;Windows SSDP Service&lt;/li&gt;&lt;li&gt;Windows Storage Spaces Controller&lt;/li&gt;&lt;li&gt;Windows TCP/IP&lt;/li&gt;&lt;li&gt;Windows TDI Translation Driver (tdx.sys)&lt;/li&gt;&lt;li&gt;Windows Universal Plug and Play (UPnP) Device Host&lt;/li&gt;&lt;li&gt;Windows USB Print Driver&lt;/li&gt;&lt;li&gt;Windows User Interface Core&lt;/li&gt;&lt;li&gt;Windows Virtualization-Based Security (VBS) Enclave&lt;/li&gt;&lt;li&gt;Windows WalletService&lt;/li&gt;&lt;li&gt;Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys)&lt;/li&gt;&lt;li&gt;Windows Win32K - GRFX&lt;/li&gt;&lt;li&gt;Windows Win32K - ICOMP&lt;/li&gt;&lt;/ul&gt;&lt;img src="https://www.tenable.com/sites/default/files/images/blog/f1dd60cc-11fd-43d9-8bee-5e821e1ba425.png" alt="A bar chart showing the count by impact of CVEs patched in the April 2026 Patch Tuesday release." width="833" height="419" referrerpolicy="no-referrer" loading="lazy"&gt;&lt;p&gt;Elevation of privilege (EoP) vulnerabilities accounted for 57.1% of the vulnerabilities patched this month, followed by information disclosure vulnerabilities and remote code execution (RCE) vulnerabilities at 12.3% each.&lt;/p&gt;&lt;div class="blog-severity-alert"&gt;&lt;div class="col-sm-2 nopad"&gt;&lt;div class="blog-severity-badge important"&gt;Important&lt;/div&gt;&lt;/div&gt;&lt;div class="col-sm-10"&gt;&lt;h2&gt;CVE-2026-20945 and CVE-2026-32201 | Microsoft SharePoint Server Spoofing Vulnerability&lt;/h2&gt;&lt;/div&gt;&lt;div class="col-sm-12"&gt;&lt;p&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20945"&gt;&lt;u&gt;CVE-2026-20945&lt;/u&gt;&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32201"&gt;&lt;u&gt;CVE-2026-32201&lt;/u&gt;&lt;/a&gt; are spoofing vulnerabilities affecting Microsoft SharePoint. CVE-2026-20945 received a CVSSv3 score of 4.6, while CVE-2026-32201 received a score of 6.5. According to Microsoft, CVE-2026-32201 was exploited in the wild as a zero-day. Microsoft has released updates for SharePoint 2016, 2019 and SharePoint Server Subscription Edition to address these flaws.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blog-severity-alert"&gt;&lt;div class="col-sm-2 nopad"&gt;&lt;div class="blog-severity-badge important"&gt;Important&lt;/div&gt;&lt;/div&gt;&lt;div class="col-sm-10"&gt;&lt;h2&gt;CVE-2026-33825 | Microsoft Defender Elevation of Privilege Vulnerability&lt;/h2&gt;&lt;/div&gt;&lt;div class="col-sm-12"&gt;&lt;p&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-33825"&gt;&lt;u&gt;CVE-2026-33825&lt;/u&gt;&lt;/a&gt; is an EoP vulnerability in Microsoft Defender. It received a CVSSv3 score of 7.8 and was rated important. According to Microsoft, this flaw was publicly disclosed prior to a patch being made available. While Microsoft’s advisory made no mention of public exploit code, the description appears to match a zero-day exploit, known as BlueHammer, with code posted to GitHub on April 3rd. A researcher using the alias "Chaotic Eclipse" released the exploit and expressed concern about Microsoft’s handling of the vulnerability disclosure process.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blog-severity-alert"&gt;&lt;div class="col-sm-2 nopad"&gt;&lt;div class="blog-severity-badge critical"&gt;Critical&lt;/div&gt;&lt;/div&gt;&lt;div class="col-sm-10"&gt;&lt;h2&gt;CVE-2026-33826 | Windows Active Directory Remote Code Execution Vulnerability&lt;/h2&gt;&lt;/div&gt;&lt;div class="col-sm-12"&gt;&lt;p&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-33826"&gt;&lt;u&gt;CVE-2026-33826&lt;/u&gt;&lt;/a&gt; is a RCE vulnerability affecting Windows Active Directory. It received a CVSSv3 score of 8, was rated as critical and was assessed as “Exploitation More Likely” according to &lt;a href="https://www.microsoft.com/en-us/msrc/exploitability-index"&gt;&lt;u&gt;Microsoft’s Exploitability Index&lt;/u&gt;&lt;/a&gt;. Successful exploitation requires an authenticated attacker to send a specially crafted RPC call to a vulnerable RPC host, resulting in code execution with the same permissions as the RPC host. Despite the exploitation assessment and severity, the Microsoft advisory does note that an attacker would need to be in the “same restricted Active Directory domain as the target system” in order to exploit this flaw.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blog-severity-alert"&gt;&lt;div class="col-sm-2 nopad"&gt;&lt;div class="blog-severity-badge critical"&gt;Critical&lt;/div&gt;&lt;/div&gt;&lt;div class="col-sm-10"&gt;&lt;h2&gt;CVE-2026-33824 | Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability&lt;/h2&gt;&lt;/div&gt;&lt;div class="col-sm-12"&gt;&lt;p&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-33824"&gt;&lt;u&gt;CVE-2026-33824&lt;/u&gt;&lt;/a&gt; is a RCE affecting Windows Internet Key Exchange (IKE) Service Extensions. It received a CVSSv3 score of 9.8 and was rated as critical. This vulnerability can be exploited by an unauthenticated attacker by sending crafted packets to a target with IKE version 2 enabled. Microsoft’s advisory includes some mitigations that can be applied in the event immediate patching cannot be performed. This includes firewall rules for UDP ports 500 and 4500.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blog-severity-alert"&gt;&lt;div class="col-sm-2 nopad"&gt;&lt;div class="blog-severity-badge important"&gt;Important&lt;/div&gt;&lt;/div&gt;&lt;div class="col-sm-10"&gt;&lt;h2&gt;CVE-2026-27913 | Windows BitLocker Security Feature Bypass Vulnerability&lt;/h2&gt;&lt;/div&gt;&lt;div class="col-sm-12"&gt;&lt;p&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-27913"&gt;&lt;u&gt;CVE-2026-27913&lt;/u&gt;&lt;/a&gt; is a security feature bypass vulnerability affecting Windows BitLocker. It received a CVSSv3 score of 7.7 and was rated as important. Successful exploitation could allow an attacker to bypass Secure Boot, a UEFI firmware security feature used to allow only trusted and properly signed software runs during the startup process. While there’s no known exploitation of this vulnerability as of the time this blog was published, Microsoft assesses this vulnerability as “Exploitation More Likely.”&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blog-severity-alert"&gt;&lt;div class="col-sm-2 nopad"&gt;&lt;div class="blog-severity-badge important"&gt;Important&lt;/div&gt;&lt;/div&gt;&lt;div class="col-sm-10"&gt;&lt;h2&gt;CVE-2026-26151 | Remote Desktop Spoofing Vulnerability&lt;/h2&gt;&lt;/div&gt;&lt;div class="col-sm-12"&gt;&lt;p&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-26151"&gt;&lt;u&gt;CVE-2026-26151&lt;/u&gt;&lt;/a&gt; is a spoofing vulnerability in Remote Desktop. It was assigned a CVSS v3 score of 7.1 and rated important. Microsoft assesses this vulnerability as more likely to be exploited. An attacker could exploit this vulnerability by convincing a target to open a crafted file. This vulnerability was credited to the United Kingdom's National Cyber Security Centre (NCSC).&lt;/p&gt;&lt;p&gt;Previously, users would not receive any warning when attempting to open a Remote Desktop Protocol (RDP) file. However, starting with the April 2026 Security Update, users will now receive more sufficient warning dialogues when interacting with potentially malicious RDP files. For more information, visit &lt;a href="https://go.microsoft.com/fwlink/?linkid=2347342"&gt;&lt;u&gt;this link&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;h2&gt;Tenable Solutions&lt;/h2&gt;&lt;p&gt;A list of all the plugins released for Microsoft’s April 2026 Patch Tuesday update can be found &lt;a href="https://www.tenable.com/plugins/search?q=%22April+2026%22+AND+script_family%3A%28%22Windows+%3A+Microsoft+Bulletins%22+OR+%22Windows+%3A+User+management%22%29&amp;amp;sort=&amp;amp;page=1"&gt;&lt;u&gt;here&lt;/u&gt;&lt;/a&gt;. As always, we recommend patching systems as soon as possible and regularly scanning your environment to identify those systems yet to be patched.&lt;/p&gt;&lt;p&gt;For more specific guidance on best practices for vulnerability assessments, please refer to our blog post on &lt;a href="http://www.tenable.com/blog/how-to-perform-efficient-vulnerability-assessments-with-tenable"&gt;&lt;u&gt;How to Perform Efficient Vulnerability Assessments with Tenable&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;&lt;h2&gt;Get more information&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-us/releaseNote/2026-Apr"&gt;&lt;u&gt;Microsoft's April 2026 Security Updates&lt;/u&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.tenable.com/plugins/search?q=%22April+2026%22+AND+script_family%3A%28%22Windows+%3A+Microsoft+Bulletins%22+OR+%22Windows+%3A+User+management%22%29&amp;amp;sort=&amp;amp;page=1"&gt;&lt;u&gt;Tenable plugins for Microsoft April 2026 Patch Tuesday Security Updates&lt;/u&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;Join &lt;/strong&gt;&lt;/em&gt;&lt;a href="https://connect.tenable.com/category/news-you-need/discussions/vulnerability-watch"&gt;&lt;em&gt;&lt;strong&gt;&lt;u&gt;Tenable's Research Special Operations (RSO) Team&lt;/u&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;em&gt;&lt;strong&gt; on Tenable Connect for further discussions on the latest cyber threats.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;Learn more about &lt;/strong&gt;&lt;/em&gt;&lt;a href="https://www.tenable.com/products/tenable-one"&gt;&lt;em&gt;&lt;strong&gt;&lt;u&gt;Tenable One&lt;/u&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;em&gt;&lt;strong&gt;, the Exposure Management Platform for the modern attack surface.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;img src="https://www.tenable.com/sites/default/files/images/articles/microsoft-patch-tuesday-april-2026.png"&gt;
</description>
  <pubDate>Tue, 14 Apr 2026 13:52:08 -0400</pubDate>
    <dc:creator>Research Special Operations</dc:creator>
    <guid isPermaLink="true">https://www.tenable.com/210840</guid>
    </item>
<item>
  <title>Crushing the Axios supply chain threat with Tenable Hexa AI: Use cases for agentic AI</title>
  <link>https://www.tenable.com/blog/crushing-axios-supply-chain-threat-tenable-hexa-ai-agentic-ai-use-cases</link>
  <description>&lt;p&gt;See how you can use Tenable Hexa AI to determine in minutes if you’re impacted by the Axios npm supply chain attack. Learn how easy it is to automate configuration of scans, identify impacted assets, prioritize remediation, and more using agentic AI from Tenable.&lt;/p&gt;&lt;div class="blog-see-also"&gt;&lt;div class="col-sm-12"&gt;&lt;h2&gt;&lt;strong&gt;Key takeaways:&amp;nbsp;&lt;/strong&gt;&lt;/h2&gt;&lt;ol&gt;&lt;li&gt;Tenable Hexa AI, the agentic engine of the &lt;a href="https://www.tenable.com/products/tenable-one" target="_blank"&gt;Tenable One Exposure Management Platform&lt;/a&gt;, can tell you in minutes if your organization is running compromised versions of the Axios npm package following a recent discovery of a supply chain attack.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Tenable Hexa AI configures and launches scans; tags affected assets by severity, owner, or business unit to scope the blast radius of the threat; and automates remediation scans to verify remediation effectiveness.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;The workflow that Tenable Hexa AI automates (targeted scan, tag, remediate, verify) applies to any emerging threat, whether the discovery of a new CVE, zero-day vulnerability, or supply chain compromise.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;When a highly utilized code package like the &lt;a href="https://www.tenable.com/blog/faq-about-the-axios-npm-supply-chain-attack-by-north-korea-nexus-threat-actor-unc1069" target="_blank"&gt;Axios npm package&lt;/a&gt; is compromised in a supply chain attack, news of the compromise often sets off a mad scramble for security teams. Responding to the discovery can take days, and typically involves manually configuring different assessments to identify if vulnerable versions of the software are present in your environment, and if so, which assets are affected by them. Then, of course, you have to implement recommended remediations, which in the case of the Axios npm supply chain attack include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Downgrade to safe versions: axios@1.14.0 or axios@0.30.3&lt;/li&gt;&lt;li&gt;Remove the phantom dependency: node_modules/plain-crypto-js/&lt;/li&gt;&lt;li&gt;Block C2 traffic to sfrclak[.]com and 142.11.206.73&lt;/li&gt;&lt;li&gt;Treat affected systems as fully compromised: rotate all secrets and credentials, rebuild from clean snapshots&lt;/li&gt;&lt;li&gt;Audit CI/CD pipelines: ephemeral runners require secret rotation; self-hosted runners are treated as fully compromised&lt;/li&gt;&lt;li&gt;Search for file artifacts: /Library/Caches/com.apple.act.mond (macOS), %PROGRAMDATA%\wt.exe (Windows), /tmp/ld.py (Linux).&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Even if you can respond and remediate within hours, it’s still not fast enough for AI-assisted threat actors. These days, we need to answer three critical questions in minutes:&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Are we exposed?&lt;/li&gt;&lt;li&gt;Where are we exposed?&lt;/li&gt;&lt;li&gt;How quickly can we mitigate the threat?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;In the first of a series of blogs on use cases for the Tenable Hexa AI agentic engine, we show you how &lt;a href="https://www.tenable.com/blog/hexa-ai-agentic-ai-for-exposure-management" target="_blank"&gt;Tenable Hexa AI&lt;/a&gt; accelerates this exact workflow to reduce your window of risk.&lt;/p&gt;&lt;h2&gt;Using Tenable Hexa AI to discover the Axios threat and answer “Are we exposed?”&lt;/h2&gt;&lt;p&gt;&lt;br&gt;&lt;img class="vidyard-player-embed" src="https://play.vidyard.com/fUYTm82QtWQ78DtAGbr6VZ.jpg" width="100%" height="100%" data-uuid="fUYTm82QtWQ78DtAGbr6VZ" data-v="4" data-type="inline" alt="Using Tenable Hexa AI agentic AI to determine if malicious versions of Axios npm package compromised in supply chain attack are in your environment" loading="lazy"&gt;&lt;/p&gt;&lt;p&gt;When researchers discover a new zero-day or supply chain compromise, the first question on security teams’ minds isn’t “How do we fix it?” It’s “Are we affected?” Answering that question shouldn’t be difficult, and with Tenable Hexa AI, it couldn’t be simpler.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Open Tenable Hexa AI and type something like, “Show me all assets in my environment vulnerable to the Axios Supply Chain vulnerability.”&lt;/p&gt;&lt;p&gt;Tenable Hexa AI then queries the Tenable One Exposure Data Fabric, the data already collected from your existing scans, agents, and integrations. Within seconds, Tenable Hexa AI produces a clear picture of which assets are running the compromised Axios versions, where they sit in your network, and how critical they are to your business.&amp;nbsp;&lt;/p&gt;&lt;p&gt;No query language. No console-hopping. No waiting for a new scan to finish. Just ask the question and get the answer.&amp;nbsp;&lt;/p&gt;&lt;h2&gt;Using Tenable Hexa AI to scope the blast radius with asset tagging&lt;/h2&gt;&lt;p&gt;&lt;br&gt;&lt;img class="vidyard-player-embed" src="https://play.vidyard.com/2y33wTZRU682C1t2HHpDj5.jpg" width="100%" height="100%" data-uuid="2y33wTZRU682C1t2HHpDj5" data-v="4" data-type="inline" alt="Using Tenable Hexa AI agentic AI to identify malicious versions of Axios compromised in supply chain attack in your environment" loading="lazy"&gt;&lt;/p&gt;&lt;p&gt;Now you know which assets are affected, but a flat list isn’t a response plan; it’s a starting point. The next step is to scope the blast radius and organize it for action. With Tenable Hexa AI, this is as simple as telling Tenable Hexa AI to “Tag this with the category Supply Chain and value Axios.”&amp;nbsp;&lt;/p&gt;&lt;p&gt;Tenable Hexa AI then bulk-applies the tag across every asset in one action. And just like that, you’ve turned a raw discovery into a structured, queryable incident surface.&amp;nbsp;&lt;/p&gt;&lt;p&gt;This matters because tagging is the bridge between exposure discovery and remediation by the right team. Once assets are tagged, you can slice them by business unit or owner to route remediation work. You can feed tagged assets into dashboards for executive visibility, and critically, the tag preserves a snapshot of the blast radius as the environment changes.&amp;nbsp;&lt;/p&gt;&lt;h2&gt;Why this capability matters beyond Axios&lt;/h2&gt;&lt;p&gt;Supply chain attacks have seen a staggering increase in recent years, with the &lt;a href="https://www.sonatype.com/state-of-the-software-supply-chain/2024/introduction" target="_blank"&gt;Sonatype 2024 State of the Software Supply Chain report&lt;/a&gt; showing a 156% year-over-year surge in attacks targeting upstream repositories like npm and PyPI. So the question isn’t &lt;em&gt;if&lt;/em&gt; another package will be poisoned, but &lt;em&gt;how much of your weekend it will consume when it happens&lt;/em&gt;.&lt;/p&gt;&lt;p&gt;What we’ve shown here with the Axios response (i.e., scope, discover, prioritize) is more than just a fix for one npm package. It represents a fundamental shift in how security teams handle emergency response.&amp;nbsp;&lt;/p&gt;&lt;p&gt;By using Tenable Hexa AI, you are building agentic and operational muscle memory. You can deploy the exact same conversational workflow you used to hunt for malicious versions of Axios the moment the next Log4j, XZ Utils, or MoveIt-style vulnerability hits the news.&lt;/p&gt;&lt;p&gt;Tenable Hexa AI transforms high-pressure fire drills like the discovery of the Axios npm supply chain attack into a structured, repeatable, and sane workflow. Instead of writing custom scripts or manually configuring policies under duress, you simply tell Tenable Hexa AI what to do, and the agentic engine handles the grunt work for you.&amp;nbsp;&lt;/p&gt;&lt;h2&gt;Use cases for agentic AI: Additional ways to use Tenable Hexa AI&amp;nbsp;&lt;/h2&gt;&lt;p&gt;Stay tuned for more use cases demonstrating the agentic power of Tenable Hexa AI. Here’s what’s coming next:&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Using Tenable Hexa AI to target remediation scans at tagged assets, schedule post-patch verification, and compare before/after results to confirm the threat is neutralized&lt;/li&gt;&lt;li&gt;Using Tenable Hexa AI to automate the creation of risk dashboards and report on security KPIs&lt;/li&gt;&lt;li&gt;Using Tenable Hexa AI to map vulnerabilities to asset owners (via Okta, CMDB, or custom mappings) and automatically notify the right teams.&lt;/li&gt;&lt;li&gt;Using Tenable Hexa AI to trigger patching workflows and network isolation for compromised assets&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Tenable Hexa AI is currently in private preview for select Tenable One customers. Contact your Tenable Account Team to join the private preview program.&lt;/p&gt;&lt;p&gt;&lt;em&gt;Want to learn more? &lt;/em&gt;&lt;a href="https://tenable.com/data-sheets/tenable-hexa-ai-the-agentic-engine-for-tenable-one-exposure-management" target="_blank"&gt;&lt;em&gt;Download the Tenable Hexa AI data sheet&lt;/em&gt;&lt;/a&gt;&lt;em&gt; to get the full technical breakdown of our agentic capabilities.&lt;/em&gt;&lt;/p&gt;
&lt;img src="https://www.tenable.com/sites/default/files/images/articles/AdobeStock_321371261_0.jpeg"&gt;
</description>
  <pubDate>Fri, 10 Apr 2026 08:10:00 -0400</pubDate>
    <dc:creator>James Davies</dc:creator>
    <guid isPermaLink="true">https://www.tenable.com/210836</guid>
    </item>
<item>
  <title>What to Know About CyberAv3ngers: The IRGC-Linked Group Targeting Critical Infrastructure</title>
  <link>https://www.tenable.com/blog/what-to-know-about-cyberav3ngers-the-irgc-linked-group-targeting-critical-infrastructure</link>
  <description>&lt;p&gt;An Iran-affiliated threat group has evolved from defacing water utility displays to deploying custom ICS malware and exploiting Rockwell Automation PLCs across multiple U.S. critical infrastructure sectors.&lt;/p&gt;&lt;div class="blog-see-also"&gt;&lt;h2&gt;Key takeaways:&lt;/h2&gt;&lt;ol&gt;&lt;li&gt;CyberAv3ngers is a state-directed threat group operating under Iran's IRGC Cyber-Electronic Command. The U.S. Treasury sanctioned six named officials in February 2024 and the State Department has offered a $10 million bounty for information on the group's activities.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;The group has escalated from exploiting default credentials on Israeli-made PLCs (2023) to deploying a custom ICS malware platform called IOCONTROL (2024) to actively exploiting CVE-2021-22681, a critical authentication bypass in Rockwell Automation controllers, across U.S. water, energy, and government facilities (2026). There is no vendor patch for this vulnerability; only defense-in-depth mitigations are available.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;A six-agency joint advisory (CISA AA26-097A) issued on April 7, 2026, confirmed operational disruption and financial loss at multiple U.S. organizations. CyberAv3ngers' ICS exploitation techniques have proliferated to an estimated 60+ affiliated groups, meaning the threat persists even if the core group is degraded. Defenders operating internet-exposed PLCs should take immediate action.&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;h2&gt;Background&lt;/h2&gt;&lt;p&gt;On April 7, 2026, the FBI, CISA, NSA, EPA, Department of Energy, and U.S. Cyber Command &lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a"&gt;&lt;u&gt;jointly warned that Iranian-affiliated advanced persistent threat actors are actively exploiting internet-facing programmable logic controllers&lt;/u&gt;&lt;/a&gt; across U.S. critical infrastructure. The advisory, designated &lt;a href="https://www.cisa.gov/sites/default/files/2026-04/AA26-097A-Iranian-Affiliated-Cyber-Actors-Exploit-Programmable-Logic-Controllers-Across-US-Critical-Infrastructure_508c.pdf"&gt;&lt;u&gt;AA26-097A&lt;/u&gt;&lt;/a&gt;, confirmed operational disruption and financial loss at multiple victim organizations in the Government Services, Water and Wastewater Systems, and Energy sectors. The authoring agencies linked this activity to the same threat ecosystem behind CyberAv3ngers, a group the U.S. government has formally attributed to Iran's Islamic Revolutionary Guard Corps Cyber-Electronic Command (IRGC-CEC).&lt;/p&gt;&lt;p&gt;CyberAv3ngers is not a new actor, but its capabilities have matured significantly since it first drew international attention in late 2023. This FAQ provides defenders, vulnerability management teams, and security leadership with a comprehensive profile of the group: its history, technical capabilities, targeted sectors, and the specific steps organizations should take to reduce their exposure.&lt;/p&gt;&lt;h2&gt;FAQ&lt;/h2&gt;&lt;h3&gt;Who is CyberAv3ngers?&lt;/h3&gt;&lt;p&gt;CyberAv3ngers is an Iranian state-directed cyber threat group operating as a persona for the IRGC-CEC. The group has been active since at least 2020 and is tracked by the security community under multiple designations, including Storm-0784 (Microsoft), Bauxite (Dragos), Hydro Kitten, UNC5691 (Mandiant), and MITRE ATT&amp;amp;CK ID G1027.&lt;/p&gt;&lt;p&gt;Despite initially presenting itself as a hacktivist collective motivated by anti-Israel ideology, subsequent investigations by CISA, the U.S. Treasury Department, and multiple cybersecurity research organizations established that the group's funding, tooling, and operational sophistication far exceeded typical hacktivist capabilities. The group is a state-sponsored actor, not an independent activist collective.&lt;/p&gt;&lt;h3&gt;Who is behind the group?&lt;/h3&gt;&lt;p&gt;In February 2024, the U.S. Treasury Department's Office of Foreign Assets Control (OFAC) &lt;a href="https://home.treasury.gov/news/press-releases/jy2072"&gt;&lt;u&gt;sanctioned six IRGC-CEC officials for directing CyberAv3ngers operations&lt;/u&gt;&lt;/a&gt;: Hamid Reza Lashgarian (head of IRGC-CEC and an IRGC-Qods Force commander), Hamid Homayunfal, Mahdi Lashgarian, Milad Mansuri, Mohammad Amin Saberian, and Mohammad Bagher Shirinkar. The State Department's Rewards for Justice program is currently offering up to $10 million for information on the "Mr. Soul" persona, which the State Department has linked to CyberAv3ngers and which is suspected to be an alias for one of the sanctioned officials.&lt;/p&gt;&lt;p&gt;In December 2025, leaked internal operational records exposed structured spreadsheets tracking domain registrations, European virtual private server hosting, and cryptocurrency payments routed through Bitcoin wallets. These records confirmed direct infrastructure and administrative overlap with the Moses Staff operation, formally connecting what had previously been treated as separate Iranian cyber personas into a single coordinated effort directed by the state.&lt;/p&gt;&lt;p&gt;The group has also demonstrated resilience through serial rebranding. When the "APT IRAN" Telegram channel, widely assessed as a CyberAv3ngers rebrand, was deleted, a new "Cyber4vengers" channel emerged in January 2026 to continue operations. Taking down individual channels and personas has not disrupted the underlying organizational capability.&lt;/p&gt;&lt;h3&gt;Should CyberAv3ngers' public claims be taken at face value?&lt;/h3&gt;&lt;p&gt;No. CyberAv3ngers operates a deliberate parallel influence campaign alongside its technical operations, and defenders should evaluate the group's public claims with skepticism.&lt;/p&gt;&lt;p&gt;DomainTools Investigations (DTI) characterized the group's strategy as "engineering beliefs" rather than merely breaching systems. CyberAv3ngers has refined its cyber activity into what DomainTools describes as a propaganda apparatus: each operation becomes a performance calibrated to sow fear and disrupt public trust, recycled data leaks are theatrically repackaged to simulate fresh compromises, and social media personas sustain the perception of threat even during operational pauses.&lt;/p&gt;&lt;p&gt;The October 2023 Dorad power station incident is the clearest example. CyberAv3ngers posted on Telegram claiming to have breached a major Israeli power plant, sharing what appeared to be screenshots of compromised control systems. DomainTools' forensic investigation demonstrated that the images were recycled from a 2022 Moses Staff data leak, cropped and rebranded with CyberAv3ngers logos. No indicators of compromise, malware samples, or valid forensic evidence were released. Despite this, the fabricated claim generated media coverage and threat intelligence discussion.&lt;/p&gt;&lt;p&gt;This dual-track strategy of blending genuine industrial control systems (ICS) operations with fabricated claims is not early-phase immaturity that the group outgrew. It is a standing operational doctrine that persists alongside the group's increasingly sophisticated technical campaigns. When CyberAv3ngers claim a new compromise, organizations should look for corroborating technical evidence before treating the claim as confirmed.&lt;/p&gt;&lt;h3&gt;What does CyberAv3ngers target?&lt;/h3&gt;&lt;p&gt;The group's primary focus is operational technology and ICS in critical infrastructure. Targeted sectors include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Water and wastewater systems&lt;/strong&gt;, the group's most persistent target since 2023, with confirmed compromises at U.S. water utilities and a private water scheme in Ireland&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Energy,&lt;/strong&gt; including fuel management systems (Orpak and Gasboy) and PLC-controlled energy infrastructure&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Government services and facilities,&lt;/strong&gt; including local municipalities targeted in the current 2026 campaign&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Healthcare and food and beverage&lt;/strong&gt; &lt;strong&gt;sectors,&lt;/strong&gt; where Unitronics PLCs were deployed and compromised during the 2023 campaign&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The targeting logic follows two principles: Israeli-manufactured technology, regardless of where it is deployed, and U.S. critical infrastructure as retaliatory targeting aligned with geopolitical hostilities between the United States and Iran.&lt;/p&gt;&lt;h3&gt;Why do small utilities and municipal operators keep getting hit?&lt;/h3&gt;&lt;p&gt;CyberAv3ngers has repeatedly compromised small water utilities, municipal facilities, and rural energy operators, and the reason is structural, not coincidental.&lt;/p&gt;&lt;p&gt;Many of these organizations manage their operational technology environments with consumer-grade remote access tools such as TeamViewer or AnyDesk, or by exposing PLC management interfaces directly to the public internet. These access methods bypass enterprise security controls entirely, creating an attack surface that is invisible to conventional security monitoring. The compromised Unitronics PLC at the Municipal Water Authority of Aliquippa, Pennsylvania was directly accessible from the internet with default credentials and no security gateway in between.&lt;/p&gt;&lt;p&gt;The problem is compounded by inadequate network segmentation between IT and OT environments. When a PLC is reachable from the same network as email servers and employee workstations, the blast radius of any compromise extends well beyond the initial point of entry. A 2024 CISA assessment found over 70% non-compliance with existing safety requirements at U.S. water utilities.&lt;/p&gt;&lt;p&gt;Organizations in these sectors typically lack dedicated OT security staff and operate under constrained budgets that make comprehensive security architecture difficult. The result is a persistent systemic exposure condition: the same type of misconfiguration that CyberAv3ngers exploited in 2023 remains available for the group and the 60+ affiliated hacktivist groups that have adopted its playbook to exploit today.&lt;/p&gt;&lt;h3&gt;How has CyberAv3ngers evolved over time?&lt;/h3&gt;&lt;p&gt;The group's operational history reveals a deliberate capability escalation across four distinct phases.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Phase 1: Propaganda (2020–2022):&lt;/strong&gt; The "Cyber Avengers" persona first appeared in 2020, claiming responsibility for power outages and rail disruptions in Israel. These claims were dismissed by Israeli officials and no supporting evidence was identified. DomainTools Investigations later demonstrated that several of these claims reused imagery from a 2022 Moses Staff data leak, cropped and rebranded to simulate a fresh intrusion.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Phase 2: Default Credential Exploitation (October 2023 – January 2024):&lt;/strong&gt; The group compromised at least 75 Unitronics Vision Series PLCs across the United States, Israel, the United Kingdom, and Ireland by exploiting default passwords on internet-exposed devices. The Municipal Water Authority of Aliquippa, Pennsylvania, was the highest-profile victim. In Ireland, an attack left residents without water for several days. CISA, the FBI, NSA, and other agencies &lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a"&gt;&lt;u&gt;issued joint advisory AA23-335A&lt;/u&gt;&lt;/a&gt; documenting the campaign.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Phase 3: Custom ICS Malware (Mid-2024):&lt;/strong&gt; Claroty's Team82 identified and analyzed IOCONTROL, a custom-built Linux malware platform designed for IoT and OT environments. The malware targets routers, PLCs, HMIs, IP cameras, firewalls, and fuel management systems from multiple vendors. IOCONTROL uses the MQTT protocol over TLS for command-and-control communications, a standard IoT protocol that allows traffic to blend with legitimate network activity. Team82 characterized IOCONTROL as a cyberweapon used by a nation-state to attack civilian critical infrastructure. Separately, OpenAI &lt;a href="https://cdn.openai.com/threat-intelligence-reports/influence-and-cyber-operations-an-update_October-2024.pdf"&gt;&lt;u&gt;disclosed in October 2024&lt;/u&gt;&lt;/a&gt; that CyberAv3ngers had used ChatGPT to perform reconnaissance on targets and debug code, indicating the group incorporates commercially available AI tools into its operational workflow.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Phase 4: Authentication Bypass Exploitation (March 2026 – Present):&lt;/strong&gt; The group pivoted to exploiting CVE-2021-22681, a critical authentication bypass vulnerability (CVSS 9.8) in Rockwell Automation Logix controllers. Actors used leased overseas infrastructure with Rockwell's Studio 5000 Logix Designer software to connect to internet-facing PLCs, bypassing authentication to manipulate project files and HMI/SCADA displays. This phase represents a platform shift from Israeli-made Unitronics devices to U.S.-made Rockwell Automation controllers, targeting a more widely deployed industrial platform.&lt;/p&gt;&lt;p&gt;This four-phase arc is not just a historical record, it is a capability escalation trajectory with a predictable direction. Dragos, which tracks the overlapping threat activity as BAUXITE, assessed in its 2026 OT/ICS Cybersecurity Year in Review that Iranian adversaries are moving beyond pre-positioning to actively mapping control loops and understanding how to manipulate physical processes. CyberAv3ngers' progression from default credentials to custom IoT malware to CVE exploitation against tier-1 ICS platforms tracks this maturation pattern. The group's next capability step is likely to involve additional ICS vendor platforms or deeper process manipulation, not a retreat to simpler techniques.&lt;/p&gt;&lt;h3&gt;What is IOCONTROL?&lt;/h3&gt;&lt;p&gt;IOCONTROL is a custom-built malware platform attributed to CyberAv3ngers by Claroty Team82. It is designed to run on a variety of Linux-based IoT and OT devices due to its modular architecture. Affected device types include IP cameras, routers, PLCs, HMIs, firewalls, and fuel management systems from vendors including D-Link, Hikvision, Baicells, Red Lion, Orpak, Phoenix Contact, Teltonika, and Unitronics.&lt;/p&gt;&lt;p&gt;Key technical characteristics include MQTT over TLS for C2 communications on port 8883, DNS-over-HTTPS to evade network monitoring when resolving C2 domains, AES-256-CBC encrypted configuration data, persistence through a systemd boot script, and capabilities including OS command execution, port scanning, and self-deletion. The malware was previously tracked under the names OrpraCab and QueueCat in 2023 before being identified under the IOCONTROL designation in 2024.&lt;/p&gt;&lt;h3&gt;Has CyberAv3ngers used AI tools?&lt;/h3&gt;&lt;p&gt;Yes. In October 2024, OpenAI published a threat intelligence report disclosing that CyberAv3ngers had used ChatGPT to assist with target reconnaissance and code debugging. The group used the platform to research ICS, explore exploitation techniques against specific device types, and troubleshoot code, incorporating a commercially available AI tool into the operational preparation phase of ICS-targeted campaigns.&lt;/p&gt;&lt;p&gt;This is consistent with a broader pattern across state-sponsored threat actors. AI tools lower the research and development overhead for operations that previously required more specialized expertise, and they are particularly useful for actors expanding into unfamiliar technology domains, such as CyberAv3ngers' pivot from Unitronics to Rockwell Automation controllers. The OpenAI disclosure does not suggest that AI fundamentally changed the group's capabilities, but it does indicate that AI-assisted reconnaissance is now part of the standard toolkit for state-directed ICS threat actors.&lt;/p&gt;&lt;h3&gt;What is CVE-2021-22681 and why does it matter?&lt;/h3&gt;&lt;p&gt;&lt;a href="https://www.tenable.com/cve/CVE-2021-22681"&gt;&lt;u&gt;CVE-2021-22681&lt;/u&gt;&lt;/a&gt; is a critical authentication bypass vulnerability (CVSS 9.8) in Rockwell Automation's Logix controller ecosystem. The flaw stems from an insufficiently protected cryptographic key used to verify communications between the Studio 5000 Logix Designer engineering software and Logix PLCs. A remote, unauthenticated attacker who obtains or intercepts this key can impersonate legitimate engineering software, bypass authentication, and establish a direct connection to affected controllers without valid credentials.&lt;/p&gt;&lt;p&gt;The vulnerability affects a wide range of Rockwell Automation products including RSLogix 5000 (versions 16–20), Studio 5000 Logix Designer (version 21 and later), and multiple Logix controller families: CompactLogix, ControlLogix, GuardLogix, DriveLogix, and SoftLogix. CVE-2021-22681 was originally disclosed in February 2021 and was added to the CISA Known Exploited Vulnerabilities catalog in March 2026 after active exploitation by Iranian-affiliated actors was confirmed.&lt;/p&gt;&lt;p&gt;A critical operational detail for vulnerability management teams: Rockwell Automation has stated that this vulnerability cannot be fully addressed with a patch. There is no software update to deploy and no patch cycle to wait for. Rockwell directs customers to apply defense-in-depth mitigations instead, including network segmentation, engineering workstation isolation, CIP Security enablement, and physical mode switch hardening. This means the exposure is permanent absent architectural controls, and organizations that rely on patch-based remediation workflows will not resolve this vulnerability through their standard processes.&lt;/p&gt;&lt;h3&gt;How severe is the current threat?&lt;/h3&gt;&lt;p&gt;The current threat level is critical. The convergence of three factors: a confirmed state-directed actor with demonstrated willingness to disrupt civilian infrastructure, a custom-built ICS malware capability alongside exploitation of a critical authentication bypass with no available patch, and &lt;a href="https://www.tenable.com/blog/operation-epic-fury-why-exposure-data-changes-everything-about-irans-cyber-kinetic-campaign"&gt;&lt;u&gt;active kinetic hostilities between the United States and Iran following Operation Epic Fury&lt;/u&gt;&lt;/a&gt;, creates the most acute Iranian cyber threat to U.S. critical infrastructure on record.&lt;/p&gt;&lt;p&gt;CISA Advisory AA26-097A confirmed that organizations from multiple U.S. critical infrastructure sectors experienced disruptions through malicious interactions with PLC project files and manipulation of data displayed on HMI and SCADA systems, resulting in operational disruption and financial loss. The FBI assessed that the actors' intent is to cause disruptive effects within the United States.&lt;/p&gt;&lt;p&gt;The threat does not depend on CyberAv3ngers remaining intact as an organization. Unverified reports have circulated that individuals linked to the group may have been killed in the Operation Epic Fury strikes, but these reports remain unconfirmed, and the continued exploitation activity documented in the April 7 advisory demonstrates that the operational capability persists regardless. More importantly, CyberAv3ngers' ICS exploitation techniques have proliferated to an estimated 60+ pro-Iranian hacktivist groups. This "swarm effect" creates a distributed threat surface with no single point of disruption, lowers the capability threshold so less experienced actors can attempt ICS attacks using shared knowledge, and increases the risk of unintended physical consequences from operators who lack the discipline or understanding to control the effects of PLC manipulation. The threat may actually become less predictable as it becomes more diffuse.&lt;/p&gt;&lt;p&gt;Finally, the systemic exposure condition that enables this threat–internet-exposed PLCs with weak or default authentication–is structural, not transient. It has persisted across every phase of CyberAv3ngers' operations despite repeated federal advisories. Until the foundational attack surface is eliminated, the same class of attack will remain viable for any group that adopts the playbook.&lt;/p&gt;&lt;h3&gt;What should organizations do right now?&lt;/h3&gt;&lt;p&gt;Organizations operating internet-exposed PLCs, particularly Rockwell Automation and Unitronics devices, should take the following actions immediately:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Disconnect PLCs from the public internet.&lt;/strong&gt; Any internet-accessible Rockwell Logix controller is exploitable via CVE-2021-22681 without authentication. There is no patch for this vulnerability. If remote access is operationally necessary, deploy a secure gateway with multifactor authentication.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Set physical mode switches to "Run."&lt;/strong&gt; This prevents remote modification of PLC logic and configurations.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Back up all PLC logic and configurations offline.&lt;/strong&gt; Store backups on secured physical media and test restore procedures.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Ingest IOCs from CISA Advisory AA26-097A.&lt;/strong&gt; Download the STIX-formatted indicators of compromise and deploy them in SIEM, IDS, and firewall platforms. Monitor for traffic on ports 44818, 2222, 102, 22, and 502 from overseas hosting providers.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Implement IT/OT network segmentation.&lt;/strong&gt; Isolate engineering workstations running Studio 5000 Logix Designer from untrusted network segments. Deploy allowlisting so only authorized workstations can communicate with controllers.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Audit remote access to OT environments.&lt;/strong&gt; Identify and replace any consumer-grade remote access tools (TeamViewer, AnyDesk, or similar) with enterprise VPN solutions that enforce multifactor authentication and centralized logging. Ensure all remote OT access is monitored.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Audit Unitronics devices.&lt;/strong&gt; Verify that all Unitronics Vision Series PLCs have had default passwords changed per VisiLogic version 9.9.00.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Deploy behavioral detection for IOCONTROL indicators.&lt;/strong&gt; Alert on MQTT over TLS (port 8883) and DNS-over-HTTPS traffic originating from OT network segments.&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Has Tenable released product coverage for the vulnerabilities discussed?&lt;/h3&gt;&lt;p&gt;A &lt;a href="https://www.tenable.com/plugins/ot/500451"&gt;&lt;u&gt;Tenable plugin&lt;/u&gt;&lt;/a&gt; is available for CVE-2021-22681, which was updated in March 2026. Tenable OT Security detects this vulnerability in Rockwell Automation Logix controller environments.&lt;/p&gt;&lt;p&gt;Organizations using the &lt;a href="https://www.tenable.com/products/tenable-one"&gt;&lt;u&gt;Tenable One Exposure Management Platform&lt;/u&gt;&lt;/a&gt; can leverage vulnerability intelligence capabilities to identify affected Rockwell Automation assets in their environment. The platform's exposure assessment capabilities can help prioritize remediation based on the active exploitation context documented in this post.&lt;/p&gt;&lt;p&gt;A list of Tenable plugins for this vulnerability can be found on the &lt;a href="https://www.tenable.com/cve/CVE-2021-22681/plugins"&gt;&lt;u&gt;CVE-2021-22681 plugins page&lt;/u&gt;&lt;/a&gt;. These plugins will be updated as additional detection coverage is developed.&lt;/p&gt;&lt;p&gt;For the latest information on Tenable detection coverage and ongoing updates, visit the &lt;a href="https://www.tenable.com/cve/CVE-2021-22681"&gt;&lt;u&gt;Tenable CVE page for CVE-2021-22681&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;&lt;h2&gt;Conclusion&lt;/h2&gt;&lt;p&gt;CyberAv3ngers has evolved from a propagandistic hacktivist persona into one of the most consequential Iranian threats to U.S. operational technology infrastructure. The group's trajectory from default credential exploitation in 2023, to custom ICS malware deployment in 2024, to active exploitation of Rockwell Automation controllers in 2026, demonstrates a deliberate capability escalation that tracks the broader maturation pattern Dragos identified across Iranian ICS-targeting groups–adversaries moving beyond pre-positioning to actively understanding and manipulating physical processes.&lt;/p&gt;&lt;p&gt;Three factors make this threat durable. First, the systemic exposure condition: internet-exposed PLCs with weak or absent authentication has persisted across every phase of the group's operations despite repeated federal advisories. Until the foundational attack surface is eliminated, the same class of attack will remain viable. Second, the exploitation playbook has proliferated to dozens of semi-autonomous groups, meaning the threat persists regardless of CyberAv3ngers' own organizational status. Third, CVE-2021-22681 has no vendor patch. Affected organizations cannot resolve this vulnerability through standard patch management workflows and must implement architectural controls instead.&lt;/p&gt;&lt;p&gt;Organizations operating Rockwell Automation or Unitronics devices should treat the recommendations in this post and CISA Advisory AA26-097A as urgent action items, not longer-term roadmap items. The threat is accelerating.&lt;/p&gt;&lt;p&gt;Tenable Research Special Operations will continue to track CyberAv3ngers and the broader Iranian ICS threat ecosystem. We will update this post as new intelligence becomes available.&lt;/p&gt;&lt;h3&gt;Get more information&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a"&gt;&lt;u&gt;CISA Advisory AA26-097A: Iranian-Affiliated Cyber Actors Exploit PLCs Across US Critical Infrastructure&lt;/u&gt;&lt;/a&gt; (April 7, 2026)&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a"&gt;&lt;u&gt;CISA Advisory AA23-335A: IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors&lt;/u&gt;&lt;/a&gt; (Updated December 2024)&lt;/li&gt;&lt;li&gt;&lt;a href="https://rewardsforjustice.net/rewards/cyberav3ngers/"&gt;&lt;u&gt;Rewards for Justice — CyberAv3ngers&lt;/u&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://claroty.com/team82/research/inside-a-new-ot-iot-cyber-weapon-iocontrol"&gt;&lt;u&gt;Claroty Team82 — Inside a New OT/IoT Cyberweapon: IOCONTROL&lt;/u&gt;&lt;/a&gt; (December 2024)&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.domaintools.com/"&gt;&lt;u&gt;DomainTools — CyberAv3ngers Influence Operations Analysis&lt;/u&gt;&lt;/a&gt; (June 2025)&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.tenable.com/cve/CVE-2021-22681"&gt;&lt;u&gt;Tenable CVE Page — CVE-2021-22681&lt;/u&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;Join&lt;/strong&gt;&lt;/em&gt; &lt;a href="https://connect.tenable.com/category/news-you-need/discussions/vulnerability-watch"&gt;&lt;em&gt;&lt;strong&gt;&lt;u&gt;Tenable's Research Special Operations (RSO) Team&lt;/u&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt; &lt;em&gt;&lt;strong&gt;on Tenable Connect and engage with us in the&lt;/strong&gt;&lt;/em&gt; &lt;a href="https://connect.tenable.com/group/threat-roundtable"&gt;&lt;em&gt;&lt;strong&gt;&lt;u&gt;Threat Roundtable group&lt;/u&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt; &lt;em&gt;&lt;strong&gt;for further discussions on the latest cyber threats.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;Learn more about&lt;/strong&gt;&lt;/em&gt; &lt;a href="https://www.tenable.com/products/tenable-one"&gt;&lt;em&gt;&lt;strong&gt;&lt;u&gt;Tenable One&lt;/u&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;em&gt;&lt;strong&gt;, the Exposure Management Platform for the modern attack surface.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;img src="https://www.tenable.com/sites/default/files/images/articles/CyberAv3ngers-targeting-critical-infrastructure.jpg"&gt;
</description>
  <pubDate>Thu, 09 Apr 2026 16:28:27 -0400</pubDate>
    <dc:creator>Research Special Operations</dc:creator>
    <guid isPermaLink="true">https://www.tenable.com/210835</guid>
    </item>
<item>
  <title>CVE-2026-35616: Fortinet FortiClientEMS improper access control vulnerability exploited in the wild</title>
  <link>https://www.tenable.com/blog/cve-2026-35616-fortinet-forticlientems-improper-access-control-vulnerability-exploited-in-the</link>
  <description>&lt;div class="blog-see-also"&gt;&lt;p&gt;Exploitation has been observed for CVE-2026-35616, a critical improper access control zero-day vulnerability affecting Fortinet FortiClientEMS devices.&lt;/p&gt;&lt;h2&gt;Key takeaways:&lt;/h2&gt;&lt;ol&gt;&lt;li&gt;CVE-2026-35616, an improper access control vulnerability, has been exploited in the wild as a zero-day.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Public exploit code has been identified and Fortinet products have a long history of targeting by malicious actors.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Hotfixes have been released by Fortinet and should be applied as soon as possible to protect from this threat.&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div class="blog-change-log" id="blog-change-log"&gt;&lt;div class="blog-change-log-head"&gt;&lt;h3&gt;Change log&lt;/h3&gt;&lt;/div&gt;&lt;div class="col-sm-12 blog-change-log-content"&gt;&lt;p&gt;&lt;strong&gt;Update April 6:&lt;/strong&gt; The blog has been updated to include that CVE-2026-35616 has been added to the CISA KEV.&lt;/p&gt;&lt;details&gt;&lt;summary&gt;&lt;strong&gt;Click here to review the change history&lt;/strong&gt;&lt;/summary&gt;&lt;article&gt;&lt;section&gt;&lt;p&gt;&lt;strong&gt;April 6:&lt;/strong&gt;The blog has been updated to include that CVE-2026-35616 has been added to the CISA KEV.&lt;br&gt;&amp;nbsp;&lt;/p&gt;&lt;/section&gt;&lt;/article&gt;&lt;/details&gt;&lt;/div&gt;&lt;/div&gt;&lt;h2&gt;Background&lt;/h2&gt;&lt;p&gt;On April 4, Fortinet published a &lt;a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-099" target="_blank"&gt;&lt;u&gt;security advisory (FG-IR-26-099)&lt;/u&gt;&lt;/a&gt; for CVE-2026-35616, a critical improper access control vulnerability affecting Fortinet FortiClientEMS.&lt;/p&gt;&lt;div class="table-responsive"&gt;&lt;table class="table"&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;&lt;strong&gt;CVE&lt;/strong&gt;&lt;/th&gt;&lt;th&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/th&gt;&lt;th&gt;&lt;strong&gt;CVSSv3&lt;/strong&gt;&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;CVE-2026-35616&lt;/td&gt;&lt;td&gt;Fortinet FortiClientEMS Improper Access Control Vulnerability&lt;/td&gt;&lt;td&gt;9.1&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;h2&gt;Analysis&lt;/h2&gt;&lt;p&gt;&lt;a href="https://www.tenable.com/cve/CVE-2026-35616"&gt;&lt;u&gt;CVE-2026-35616&lt;/u&gt;&lt;/a&gt; is a critical improper access control vulnerability affecting Fortinet FortiClientEMS. A remote, unauthenticated attacker can exploit this flaw to execute arbitrary code using specially crafted requests which bypass API authentication.&lt;/p&gt;&lt;p&gt;While no attribution has been provided as of the time this blog was published, the advisory from Fortinet confirms that exploitation has been observed. The advisory credits Simo Kohonen from Defused and Nguyen Duc Anh, who reported the vulnerability to Fortinet. On April 4, Defused released a &lt;a href="https://www.linkedin.com/feed/update/urn:li:share:7446082047514681344/" target="_blank"&gt;&lt;u&gt;Linkedin post&lt;/u&gt;&lt;/a&gt; confirming their observations of zero-day exploitation of this flaw.&lt;/p&gt;&lt;p&gt;At the time this blog was published, Tenable Research has classified this flaw as a Vulnerability of Interest according to our &lt;a href="https://www.tenable.com/blog/reducing-remediation-time-remains-a-challenge-how-tenable-vulnerability-watch-can-help"&gt;Vulnerability Watch classification system&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Historical Exploitation of Fortinet Devices&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Fortinet vulnerabilities have historically been common targets for cyber attackers, with 24 Fortinet CVEs currently on the Cybersecurity and Infrastructure Security Agency’s (CISA) &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog"&gt;&lt;u&gt;Known Exploited Vulnerabilities&lt;/u&gt;&lt;/a&gt; (KEV) list, with 13 of those being linked to ransomware campaigns. Targeting of Fortinet flaws have been attributed to a number of threat actors, including &lt;a href="https://www.tenable.com/blog/salt-typhoon-an-analysis-of-vulnerabilities-exploited-by-this-state-sponsored-actor"&gt;Salt Typhoon&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Just over a week ago, Defused reported exploitation in the wild for &lt;a href="https://www.tenable.com/cve/CVE-2026-21643"&gt;CVE-2026-21643&lt;/a&gt;, SQL injection vulnerability affecting FortiClientEMS. Fortinet’s advisory now reflects that exploitation has been observed but as of April 6, the flaw has not yet been added to the KEV.&lt;/p&gt;&lt;blockquote class="twitter-tweet"&gt;&lt;p lang="en" dir="ltr"&gt;🚨 Fortinet Forticlient EMS CVE-2026-21643 - currently marked as not exploited on CISA and other Known Exploited Vulnerabilities (KEV) lists - has seen first exploitation already 4 days ago according to our data&lt;br&gt;&lt;br&gt;Attackers can smuggle SQL statements through the "Site"-header… &lt;a href="https://t.co/pHwl2qMVsj"&gt;pic.twitter.com/pHwl2qMVsj&lt;/a&gt;&lt;/p&gt;&lt;p&gt;— Defused (@DefusedCyber) &lt;a href="https://twitter.com/DefusedCyber/status/2037912573274636781?ref_src=twsrc%5Etfw"&gt;March 28, 2026&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;At the time this blog was published on April 6, CVE-2026-35616 had not been added to the KEV, however shortly after publication, the KEV was &lt;a href="https://www.cisa.gov/news-events/alerts/2026/04/06/cisa-adds-one-known-exploited-vulnerability-catalog" target="_blank"&gt;updated to include CVE-2026-35616&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;As Fortinet devices have been popular targets for attackers, the Tenable Research Special Operations Team (RSO) has authored several blogs about vulnerabilities affecting these devices. The following table outlines some of the most impactful Fortinet vulnerabilities in recent years.&lt;/p&gt;&lt;div class="table-responsive"&gt;&lt;table class="table"&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;&lt;strong&gt;CVE&lt;/strong&gt;&lt;/th&gt;&lt;th&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/th&gt;&lt;th&gt;&lt;strong&gt;Published&lt;/strong&gt;&lt;/th&gt;&lt;th&gt;&lt;strong&gt;Tenable Blog&lt;/strong&gt;&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/cve/CVE-2025-64155"&gt;&lt;u&gt;CVE-2025-64155&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;td&gt;Fortinet FortiSIEM Command Injection Vulnerability&lt;/td&gt;&lt;td&gt;January 2026&lt;/td&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/blog/cve-2025-64155-exploit-code-released-for-critical-fortinet-fortisiem-command-injection"&gt;&lt;u&gt;CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection Vulnerability&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/cve/CVE-2025-64446"&gt;&lt;u&gt;CVE-2025-64446&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;td&gt;Fortinet FortiWeb Path Traversal Vulnerability&lt;/td&gt;&lt;td&gt;November 2025&lt;/td&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/blog/cve-2025-64446-fortinet-fortiweb-zero-day-path-traversal-vulnerability-exploited-in-the-wild"&gt;&lt;u&gt;CVE-2025-64446: Fortinet FortiWeb Zero-Day Path Traversal Vulnerability Exploited in the Wild&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/cve/CVE-2025-25256"&gt;&lt;u&gt;CVE-2025-25256&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;td&gt;Fortinet FortiSIEM Command Injection Vulnerability&lt;/td&gt;&lt;td&gt;August 2025&lt;/td&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/blog/cve-2025-25256-proof-of-concept-released-for-critical-fortinet-fortisiem-command-injection"&gt;&lt;u&gt;CVE-2025-25256: Proof of Concept Released for Critical Fortinet FortiSIEM Command Injection Vulnerability&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/cve/CVE-2025-32756"&gt;&lt;u&gt;CVE-2025-32756&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;td&gt;Fortinet FortiVoice, FortiMail, FortiNDR, FortiRecorder and FortiCamera Arbitrary Code Execution Vulnerability&lt;/td&gt;&lt;td&gt;May 2025&lt;/td&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/blog/cve-2025-32756-zero-day-vulnerability-in-multiple-fortinet-products-exploited-in-the-wild"&gt;&lt;u&gt;CVE-2025-32756: Zero-Day Vulnerability in Multiple Fortinet Products Exploited in the Wild&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/cve/CVE-2024-55591"&gt;&lt;u&gt;CVE-2024-55591&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;td&gt;Fortinet Authentication Bypass in FortiOS and FortiProxy&lt;/td&gt;&lt;td&gt;January 2025&lt;/td&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/blog/cve-2024-55591-fortinet-authentication-bypass-zero-day-vulnerability-exploited-in-the-wild"&gt;&lt;u&gt;CVE-2024-55591: Fortinet Authentication Bypass Zero-Day Vulnerability Exploited in the Wild&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/cve/CVE-2024-21762"&gt;&lt;u&gt;CVE-2024-21762&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;td&gt;Fortinet FortiOS Out-of-bound Write Vulnerability in sslvpnd&lt;/td&gt;&lt;td&gt;February 2024&lt;/td&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/blog/cve-2024-21762-critical-fortinet-fortios-out-of-bound-write-ssl-vpn-vulnerability"&gt;&lt;u&gt;CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/cve/CVE-2023-27997"&gt;&lt;u&gt;CVE-2023-27997&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;td&gt;FortiOS and FortiProxy Heap-Based Buffer Overflow Vulnerability&lt;/td&gt;&lt;td&gt;June 2023&lt;/td&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/blog/cve-2023-27997-heap-based-buffer-overflow-in-fortinet-fortios-and-fortiproxy-ssl-vpn-xortigate"&gt;&lt;u&gt;CVE-2023-27997: Heap-Based Buffer Overflow in Fortinet FortiOS and FortiProxy SSL-VPN (XORtigate)&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/cve/CVE-2022-42475"&gt;&lt;u&gt;CVE-2022-42475&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;td&gt;FortiOS and FortiProxy Heap-Based Buffer Overflow Vulnerability&lt;/td&gt;&lt;td&gt;December 2022&lt;/td&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/blog/cve-2022-42475-fortinet-patches-zero-day-in-fortios-ssl-vpns"&gt;&lt;u&gt;CVE-2022-42475: Fortinet Patches Zero Day in FortiOS SSL VPNs&lt;/u&gt;&lt;/a&gt;&lt;a href="https://www.tenable.com/blog/aa23-250a-multiple-nation-state-threat-actors-exploit-cve-2022-47966-and-cve-2022-42475"&gt;&lt;u&gt;AA23-250A: Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/cve/CVE-2022-40684"&gt;&lt;u&gt;CVE-2022-40684&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;td&gt;FortiOS and FortiProxy Authentication Bypass Vulnerability&lt;/td&gt;&lt;td&gt;October 2022&lt;/td&gt;&lt;td&gt;&lt;a href="https://www.tenable.com/blog/cve-2022-40684-critical-authentication-bypass-in-fortios-and-fortiproxy"&gt;&lt;u&gt;CVE-2022-40684: Critical Authentication Bypass in FortiOS and FortiProxy&lt;/u&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;h2&gt;Proof of concept&lt;/h2&gt;&lt;p&gt;As of April 6, a public proof-of-concept has been identified on GitHub, however Tenable Research has not yet verified the exploit. Given the past exploitation of Fortinet devices and published exploit code for several past vulnerabilities, we anticipate that exploitation will continue to increase as additional exploits are released.&lt;/p&gt;&lt;h2&gt;Solution&lt;/h2&gt;&lt;p&gt;The following table details the affected and fixed versions of Fortinet FortiClientEMS devices for CVE-2026-35616:&lt;/p&gt;&lt;div class="table-responsive"&gt;&lt;table class="table"&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;&lt;strong&gt;Product Version&lt;/strong&gt;&lt;/th&gt;&lt;th&gt;&lt;strong&gt;Affected Range&lt;/strong&gt;&lt;/th&gt;&lt;th&gt;&lt;strong&gt;Fixed Version&lt;/strong&gt;&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;FortiClientEMS 7.2&lt;/td&gt;&lt;td&gt;Not affected&lt;/td&gt;&lt;td&gt;N/A&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;FortiClientEMS 7.4&lt;/td&gt;&lt;td&gt;7.4.5 through 7.4.6&lt;/td&gt;&lt;td&gt;7.4.7 or above&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;p&gt;As of April 6, Fortinet has provided a hotfix for FortiClient EMS &lt;a href="https://docs.fortinet.com/document/forticlient/7.4.5/ems-release-notes/832484" target="_blank"&gt;&lt;u&gt;7.4.5&lt;/u&gt;&lt;/a&gt; and &lt;a href="https://docs.fortinet.com/document/forticlient/7.4.6/ems-release-notes/832484" target="_blank"&gt;&lt;u&gt;7.4.6&lt;/u&gt;&lt;/a&gt; to address this vulnerability. Version 7.4.7 has not yet been released, but will be an upcoming release that addresses this vulnerability. Until that release, the hotfix must be applied to be protected against this vulnerability. We recommend reviewing the &lt;a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-099" target="_blank"&gt;&lt;u&gt;security advisory&lt;/u&gt;&lt;/a&gt; as Fortinet may make future updates to the document.&lt;/p&gt;&lt;h2&gt;Identifying affected systems&lt;/h2&gt;&lt;p&gt;A list of Tenable plugins for this vulnerability can be found on the individual CVE page for &lt;a href="https://www.tenable.com/cve/CVE-2026-35616/plugins"&gt;&lt;u&gt;CVE-2026-35616&lt;/u&gt;&lt;/a&gt; as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our &lt;a href="https://www.tenable.com/plugins/pipeline"&gt;&lt;u&gt;Plugins Pipeline&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Additionally, customers can utilize Tenable Attack Surface Management to identify public facing assets running Fortinet devices by using the following subscription:&lt;/p&gt;&lt;img src="https://www.tenable.com/sites/default/files/images/blog/fc91906e-f12b-43f1-8fe6-397a8933e6ea.png" width="1252" height="614" referrerpolicy="no-referrer" loading="lazy"&gt;&lt;h3&gt;&amp;nbsp;&lt;/h3&gt;&lt;h3&gt;Get more information&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-099" target="_blank"&gt;&lt;u&gt;Fortinet FG-IR-26-099 Security Advisory&lt;/u&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;Join &lt;/strong&gt;&lt;/em&gt;&lt;a href="https://connect.tenable.com/category/news-you-need/discussions/cyber-exposure-alerts"&gt;&lt;em&gt;&lt;strong&gt;&lt;u&gt;Tenable's Research Special Operations (RSO) Team&lt;/u&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;em&gt;&lt;strong&gt; on the Tenable Community.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;Learn more about &lt;/strong&gt;&lt;/em&gt;&lt;a href="https://www.tenable.com/products/tenable-one"&gt;&lt;em&gt;&lt;strong&gt;&lt;u&gt;Tenable One&lt;/u&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;em&gt;&lt;strong&gt;, the Exposure Management Platform for the modern attack surface.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;img src="https://www.tenable.com/sites/default/files/images/articles/FAQ-advisory-zero-day-CVE-2026-35616.png"&gt;
</description>
  <pubDate>Mon, 06 Apr 2026 10:21:05 -0400</pubDate>
    <dc:creator>Scott Caveza</dc:creator>
    <guid isPermaLink="true">https://www.tenable.com/210827</guid>
    </item>
<item>
  <title>The developer credential economy: Why exposure data is the new front line in the supply chain war</title>
  <link>https://www.tenable.com/blog/the-developer-credential-economy-exposure-data-is-the-new-front-line-in-the-supply-chain-war</link>
  <description>&lt;div class="blog-see-also"&gt;&lt;p&gt;Recent supply chain attacks have highlighted an urgent need for organizations to shift from a reactive security posture to a preemptive exposure management strategy. Learn why endpoint detection and response tools don’t have you covered when highly privileged developer credentials get exposed.&lt;/p&gt;&lt;h2&gt;Key takeaways:&lt;/h2&gt;&lt;ol&gt;&lt;li&gt;Recent supply chain attacks are emblematic of an insidious new trend in cybercrime: Threat actors are increasingly using supply chain attacks to harvest highly privileged developer credentials and create a “Developer Credential Economy,” a lucrative black market for API keys, secrets, and cloud access tokens.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Relying on execution-layer detection, such as EDR, is insufficient against supply chain threats because these tools lack visibility into the ephemeral CI/CD environments where credential theft and weaponization actually occur.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Neutralizing the systemic infrastructure risk created by the Developer Credential Economy requires a continuous threat exposure management (CTEM) approach to proactively identify and eliminate exposure conditions, such as long-lived access tokens, before an attacker can exploit them.&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;h2&gt;Background&lt;/h2&gt;&lt;p&gt;The convergence of the &lt;a href="https://www.axios.com/2026/03/31/anthropic-leaked-source-code-ai" target="_blank"&gt;&lt;u&gt;Anthropic Claude Code source leak&lt;/u&gt;&lt;/a&gt; and the &lt;a href="https://www.tenable.com/blog/faq-about-the-axios-npm-supply-chain-attack-by-north-korea-nexus-threat-actor-unc1069"&gt;&lt;u&gt;Sapphire Sleet (UNC1069) Axios compromise&lt;/u&gt;&lt;/a&gt; has collapsed the boundary between traditional malware and systemic infrastructure risk. Our analysis of the exposure intelligence data reveals that the cluster of supply chain attacks observed in March 2026 should not be viewed as disparate incidents; rather, they signify the new operational reality of a high-velocity &lt;strong&gt;“Developer Credential Economy,”&lt;/strong&gt; a black market for highly privileged developer credentials.&lt;/p&gt;&lt;p&gt;In this new reality, attackers are no longer just hacking software supply chains; they’re systematically using supply chain attacks to harvest the very keys to the kingdom from the tools security teams trust most.&lt;/p&gt;&lt;h2&gt;The myth of the EDR singularity&lt;/h2&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/posts/microsoft-threat-intelligence_mitigating-the-axios-npm-supply-chain-compromise-activity-7445214271774556160-lusQ/" target="_blank"&gt;&lt;u&gt;Microsoft&lt;/u&gt;&lt;/a&gt; and &lt;a href="https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package" target="_blank"&gt;&lt;u&gt;Google&lt;/u&gt;&lt;/a&gt; have independently attributed the recent Axios compromise to a North Korean state actor. Industry narratives have framed the compromise, which backdoored an npm-managed JavaScript library package with 100 million weekly downloads, as a victory for endpoint detection and response (&lt;a href="https://www.tenable.com/cybersecurity-guide/principles/endpoint-detection-and-response-edr"&gt;&lt;u&gt;EDR&lt;/u&gt;&lt;/a&gt;). The logic seems simple: EDR caught and stopped the payload at execution, therefore EDR is the solution.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;This is a dangerous miscalculation.&lt;/strong&gt; The concept of an EDR singularity, where Endpoint Detection and Response (EDR) solutions become so comprehensive, intelligent, and autonomous that they negate the need for virtually all other security tools and human intervention at the endpoint is a powerful and seductive myth dominating the current security landscape. This narrative suggests that, through advancements in machine learning, behavioral analytics, and automated response capabilities, a single, all-encompassing EDR platform will eventually unify and solve the bulk of security challenges.&lt;/p&gt;&lt;p&gt;Relying on EDR to stop a supply chain attack is like relying on a smoke detector while storing open canisters of gasoline in your kitchen. Our analysis shows that by the time an EDR agent fires on the &lt;strong&gt;WAVESHAPER.V2 RAT&lt;/strong&gt;, the true damage — the exposure — has already occurred. This demonstrates the urgent need for organizations to shift from a reactive to a preemptive cybersecurity posture.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;EDR is reactive:&lt;/strong&gt; It monitors execution, not the conditions that allow it. It cannot see the misconfigured GitHub Action or the over-privileged npm token that enabled the compromise in the first place.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;The coverage gap:&lt;/strong&gt; EDR has zero visibility into the ephemeral CI/CD runners and build environments where these credentials are stolen. In the Developer Credential Economy, the theft happens where the agents aren't.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;The fail-deadly speed:&lt;/strong&gt; In the Axios campaign, the malware was designed to exfiltrate secrets and self-destruct within seconds; typically faster than an EDR alert can be triaged by a human analyst.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;EDR evasion is not theoretical:&lt;/strong&gt; EDR evasion is an active, industrialized capability. Threat actors routinely bypass kernel-level EDR through bring your own vulnerable driver (BYOVD) attacks, where adversaries load legitimately signed but vulnerable kernel drivers to disable or blind EDR agents.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Targeting analysis: Mapping the credential generation layer&lt;/h2&gt;&lt;p&gt;Adversaries are increasingly compromising and &lt;a href="https://www.sans.org/blog/when-security-scanner-became-weapon-inside-teampcp-supply-chain-campaign" target="_blank"&gt;&lt;u&gt;weaponizing&lt;/u&gt;&lt;/a&gt; critical chokepoint tools used by developers and security teams, like the Axios npm package and the KICS IaC scanner. This trend, which involves moving upstream in the development lifecycle, reveals a distinct division of labor within this emerging threat economy.&lt;/p&gt;&lt;img src="https://www.tenable.com/sites/default/files/images/blog/a019e575-eeaf-4789-89a4-e2fe01ec533d.png" alt="Tenable Attack Path Interruption image" width="1024" height="559" referrerpolicy="no-referrer" loading="lazy"&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class="table-responsive"&gt;&lt;table class="table"&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;&lt;strong&gt;Actor / Group&lt;/strong&gt;&lt;/th&gt;&lt;th&gt;&lt;strong&gt;Operational focus&lt;/strong&gt;&lt;/th&gt;&lt;th&gt;&lt;strong&gt;Primary target&lt;/strong&gt;&lt;/th&gt;&lt;th&gt;&lt;strong&gt;Vertical Impact&lt;/strong&gt;&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;TeamPCP&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;Generation layer:&lt;/strong&gt; Bulk credential harvesting via tool exploitation&lt;/td&gt;&lt;td&gt;Trivy, LiteLLM, KICS (Security/Dev tools)&lt;/td&gt;&lt;td&gt;Global SaaS &amp;amp; AI infrastructure&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Sapphire Sleet&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;Weaponization layer:&lt;/strong&gt; State-sponsored exfiltration and revenue generation&lt;/td&gt;&lt;td&gt;Axios, npm ecosystem&lt;/td&gt;&lt;td&gt;Fintech, Crypto, Government&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;GlassWorm&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;Opportunistic layer:&lt;/strong&gt; High-volume automated theft&lt;/td&gt;&lt;td&gt;VSCode extensions, OpenVSX&lt;/td&gt;&lt;td&gt;Blockchain &amp;amp; Web3&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;p&gt;Actors are successfully exploiting exposures, such as long-lived tokens, overprivileged CI/CD runners, and unpinned dependencies, to force organizations into a reactive posture.&lt;/p&gt;&lt;h2&gt;Exposure intelligence: The shift to CTEM&lt;/h2&gt;&lt;p&gt;To escape this pattern, defenders must shift from merely reacting to malware to adopting &lt;strong&gt;continuous threat exposure management (&lt;/strong&gt;&lt;a href="https://www.tenable.com/cybersecurity-guide/learn/what-is-ctem"&gt;&lt;strong&gt;&lt;u&gt;CTEM&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;)&lt;/strong&gt; as a preemptive strategy.&lt;/p&gt;&lt;p&gt;While AI companies market their frontier models as security tools, the recent leak of 512,000 lines of Claude source code demonstrates that AI is just another asset with its own massive exposure profile.&lt;/p&gt;&lt;p&gt;A mature CTEM program, powered by &lt;strong&gt;exposure intelligence&lt;/strong&gt;, focuses on the preemptive actions that actually reduce risk:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Phase 1: Hardening (The Kill Switch)&lt;/strong&gt;: Organizations must audit lockfiles and kill lifecycle hooks (&lt;em&gt;--ignore-scripts&lt;/em&gt;) immediately. This eliminates the postinstall vector that Sapphire Sleet used to deploy WAVESHAPER.V2.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Phase 2: Human/Identity defense:&lt;/strong&gt; We must eliminate long-lived tokens. The Axios compromise succeeded because a single stolen token bypassed every security control. Transitioning to short-lived, OIDC-based automation is an exposure management requirement, not a nice-to-have.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Phase 3: Counter-recon:&lt;/strong&gt; Use &lt;strong&gt;Tenable One&lt;/strong&gt; to map your full attack surface, including the &lt;a href="https://www.tenable.com/cybersecurity-guide/learn/shift-left-security-and-cicd-pipelines"&gt;&lt;u&gt;CI/CD pipelines&lt;/u&gt;&lt;/a&gt; and cloud-native build stages that EDR cannot reach.&lt;/li&gt;&lt;/ol&gt;&lt;h2&gt;The bottom line&lt;/h2&gt;&lt;p&gt;The Axios and Anthropic events are a wake-up call for the C-suite. Theoretical severity and reactive detection (EDR) are insufficient against an adversary that has industrialized the theft of developer identities.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.tenable.com/exposure-management"&gt;&lt;strong&gt;&lt;u&gt;Exposure management&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt; should be your first and primary line of defense. By identifying and remediating the exposure conditions that supply chain attacks depend on, we can stop the payload before it ever reaches the endpoint.&lt;/p&gt;&lt;h3&gt;Get more information&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://www.tenable.com/blog/faq-about-the-axios-npm-supply-chain-attack-by-north-korea-nexus-threat-actor-unc1069"&gt;&lt;u&gt;Read the Tenable Research Special Operations Advisory on the Axios npm Compromise&lt;/u&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.tenable.com/blog/hexa-ai-agentic-ai-for-exposure-management"&gt;&lt;u&gt;Accelerate your preemptive security with Tenable’s agentic engine, Hexa AI&lt;/u&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.tenable.com/products/tenable-one"&gt;&lt;u&gt;Explore Tenable One for Exposure Management&lt;/u&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;Join &lt;/strong&gt;&lt;/em&gt;&lt;a href="https://connect.tenable.com/category/news-you-need/discussions/vulnerability-watch"&gt;&lt;em&gt;&lt;strong&gt;&lt;u&gt;Tenable's Research Special Operations (RSO) Team&lt;/u&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;em&gt;&lt;strong&gt; on Tenable Connect for further discussions on the latest cyber threats.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;Learn more about &lt;/strong&gt;&lt;/em&gt;&lt;a href="https://www.tenable.com/products/tenable-one"&gt;&lt;em&gt;&lt;strong&gt;&lt;u&gt;Tenable One&lt;/u&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;em&gt;&lt;strong&gt;, the Exposure Management Platform for the modern attack surface.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;img src="https://www.tenable.com/sites/default/files/images/articles/Exposure%20Data2_0.png"&gt;
</description>
  <pubDate>Fri, 03 Apr 2026 14:50:57 -0400</pubDate>
    <dc:creator>Research Special Operations</dc:creator>
    <guid isPermaLink="true">https://www.tenable.com/210826</guid>
    </item>
<item>
  <title>Frequently Asked Questions About the Axios npm Supply Chain Attack by North Korea-Nexus Threat Actor UNC1069</title>
  <link>https://www.tenable.com/blog/faq-about-the-axios-npm-supply-chain-attack-by-north-korea-nexus-threat-actor-unc1069</link>
  <description>&lt;p&gt;A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access trojan to potentially millions of developer environments during a three-hour window on March 31.&lt;/p&gt;&lt;div class="blog-see-also"&gt;&lt;h2&gt;Key takeaways:&lt;/h2&gt;&lt;ol&gt;&lt;li&gt;The axios npm package, which has over 100 million weekly downloads, was compromised in a supply chain attack attributed by Google Threat Intelligence Group (GTIG) to UNC1069, a financially motivated North Korea-nexus threat actor.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Malicious versions 1.14.1 and 0.30.4 were live on the npm registry for approximately three hours and delivered the WAVESHAPER.V2 backdoor to macOS, Windows and Linux systems.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;The malicious versions have been removed from npm, and developers who installed them are advised to treat affected systems as fully compromised, rotate all credentials and rebuild from clean snapshots.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;h2&gt;Background&lt;/h2&gt;&lt;p&gt;Tenable's Research Special Operations (RSO) team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding a supply chain attack against the axios npm package.&lt;/p&gt;&lt;h2&gt;FAQ&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;What happened to the axios npm package?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;On March 31, 2026, an attacker published two malicious versions of the axios npm package, versions 1.14.1 and 0.30.4, to the npm registry. The attacker had compromised the maintainer account associated with the package and injected a malicious dependency called "plain-crypto-js" that served as a delivery vehicle for a cross-platform remote access trojan (RAT). The malicious versions were live on the npm registry for approximately three hours before they were identified and removed.&lt;/p&gt;&lt;p&gt;See how recent supply chain attacks are creating a &lt;a href="https://www.tenable.com/blog/the-developer-credential-economy-exposure-data-is-the-new-front-line-in-the-supply-chain-war" target="_blank"&gt;black market for highly privileged developer credentials&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;How popular is the axios npm package?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Axios is one of the most widely used JavaScript libraries, used to simplify HTTP requests. The 1.x branch typically has over 100 million weekly downloads, and the 0.x branch has over 83 million.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;How was the axios maintainer account compromised?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;According to analysis by &lt;a href="https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan"&gt;&lt;u&gt;StepSecurity&lt;/u&gt;&lt;/a&gt; and &lt;a href="https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package"&gt;&lt;u&gt;Google Threat Intelligence Group (GTIG)&lt;/u&gt;&lt;/a&gt;, the attacker compromised the npm account belonging to @jasonsaayman and changed the associated email address to an attacker-controlled address (&lt;a href="mailto:ifstap@proton.me"&gt;&lt;u&gt;ifstap@proton.me&lt;/u&gt;&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;The attacker used a long-lived classic npm access token to publish the malicious versions, bypassing the GitHub Actions OIDC workflow used for legitimate releases. Legitimate axios releases show a trusted publisher binding to GitHub Actions with a corresponding GitHub commit and tag. The malicious versions lacked this entirely, providing one of the clearest signals that the release was unauthorized.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What is the malicious dependency and how does it work?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;The attacker published a purpose-built malicious package called plain-crypto-js@4.2.1 to npm approximately 22 minutes before publishing the first malicious axios version. A clean decoy version (4.2.0) was published roughly 18 hours earlier. The only change to the axios package itself was the addition of plain-crypto-js as a dependency in package.json. The package is never imported or referenced in axios source code.&lt;/p&gt;&lt;p&gt;When npm installs the compromised axios version, the plain-crypto-js package's postinstall hook executes an obfuscated JavaScript file called setup.js, which GTIG tracks as SILKBELL. This dropper uses a two-layer encoding scheme combining reversed Base64 and XOR cipher (key: "OrDeR_7077", constant: 333) to conceal its command-and-control (C2) URL and execution commands. It dynamically loads Node.js modules (fs, os, execSync) to evade static analysis.&lt;/p&gt;&lt;p&gt;After deploying the platform-specific payload, the dropper performs anti-forensic cleanup: it deletes itself, deletes the malicious package.json, and renames a clean stub file (package.md) to package.json, leaving a completely clean manifest upon post-infection inspection.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What malware does the attack deliver?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;GTIG tracks the platform-specific payloads as WAVESHAPER.V2, an updated version of the WAVESHAPER backdoor previously attributed to UNC1069. WAVESHAPER.V2 variants exist for macOS (native C++ binary), Windows (PowerShell) and Linux (Python).&lt;/p&gt;&lt;p&gt;On &lt;strong&gt;macOS&lt;/strong&gt;, the dropper downloads a Mach-O binary to /Library/Caches/com.apple.act.mond, disguised as an Apple system cache file.&lt;/p&gt;&lt;p&gt;On &lt;strong&gt;Windows&lt;/strong&gt;, it copies the legitimate PowerShell executable to %PROGRAMDATA%\wt.exe (disguised as Windows Terminal) and uses a VBScript launcher to execute a downloaded PowerShell script with hidden execution and policy bypass flags. Windows persistence is achieved through a hidden batch file (%PROGRAMDATA%\system.bat) and a registry run key (HKCU:\Software\Microsoft\Windows\CurrentVersion\Run) named "MicrosoftUpdate."&lt;/p&gt;&lt;p&gt;On &lt;strong&gt;Linux&lt;/strong&gt;, a Python RAT is downloaded to /tmp/ld.py and launched via nohup.&lt;/p&gt;&lt;p&gt;Regardless of platform, WAVESHAPER.V2 beacons to the C2 server every 60 seconds using Base64-encoded JSON and a hardcoded User-Agent string spoofing Internet Explorer 8 on Windows XP. The backdoor supports commands including:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;kill (terminate)&lt;/li&gt;&lt;li&gt;rundir (filesystem enumeration)&lt;/li&gt;&lt;li&gt;runscript (execute AppleScript)&lt;/li&gt;&lt;li&gt;peinject (binary injection).&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Who is behind this attack?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;GTIG &lt;a href="https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package"&gt;&lt;u&gt;attributed this activity&lt;/u&gt;&lt;/a&gt; to UNC1069, a financially motivated North Korea-nexus threat actor active since at least 2018. The group has previously been tracked as both CryptoCore and MASAN by ClearSky (2020) and GTIG (2025), respectively. The attribution is based on the use of WAVESHAPER.V2 (a direct evolution of the WAVESHAPER backdoor previously attributed to UNC1069), infrastructure overlaps (connections from a specific AstrillVPN node previously used by UNC1069) and adjacent infrastructure on the same ASN historically linked to UNC1069 operations.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;How quickly was the compromise detected?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://socket.dev/blog/axios-npm-package-compromised"&gt;&lt;u&gt;Socket.dev's&lt;/u&gt;&lt;/a&gt; automated malware scanner detected the compromise within approximately six minutes of the first malicious version being published. Both malicious axios versions were removed from the npm registry approximately three hours after publication.&lt;/p&gt;&lt;div class="table-responsive"&gt;&lt;table class="table"&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;&lt;strong&gt;Time (UTC)&lt;/strong&gt;&lt;/th&gt;&lt;th&gt;&lt;strong&gt;Event&lt;/strong&gt;&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;March 30, 05:57&lt;/td&gt;&lt;td&gt;plain-crypto-js@4.2.0 (clean decoy) published&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;March 30, 23:59&lt;/td&gt;&lt;td&gt;plain-crypto-js@4.2.1 (malicious) published with postinstall hook&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;March 31, 00:05&lt;/td&gt;&lt;td&gt;Socket automated scanner detects compromise (~6 min)&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;March 31, 00:21&lt;/td&gt;&lt;td&gt;axios@1.14.1 published&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;March 31, 01:00&lt;/td&gt;&lt;td&gt;axios@0.30.4 published&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;March 31, 01:50&lt;/td&gt;&lt;td&gt;Elastic Security Labs files GitHub Security Advisory to Axios repo&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;March 31, ~03:15&lt;/td&gt;&lt;td&gt;npm unpublishes both malicious axios versions&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;March 31, 03:25&lt;/td&gt;&lt;td&gt;npm initiates security hold on plain-crypto-js&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;March 31, 04:26&lt;/td&gt;&lt;td&gt;Security stub replaces malicious package&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;p&gt;&lt;strong&gt;How widespread is the potential impact?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;With over 100 million weekly downloads across both branches, the blast radius of a three-hour compromise window is significant. &lt;a href="https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan"&gt;&lt;u&gt;StepSecurity&lt;/u&gt;&lt;/a&gt; reported that its Harden-Runner tool detected anomalous C2 contact in over 12,000 projects. Hundreds of other npm packages depend on axios, amplifying the downstream exposure.&lt;/p&gt;&lt;p&gt;GTIG cautioned that "hundreds of thousands of stolen secrets could potentially be circulating" as a result of this and other recent supply chain attacks, potentially enabling further software supply chain compromises, SaaS environment breaches, ransomware events and cryptocurrency theft.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Are there indicators of compromise (IoCs)?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Yes. GTIG published a comprehensive set of IoCs in their &lt;a href="https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package"&gt;&lt;u&gt;blog post&lt;/u&gt;&lt;/a&gt; as well as &lt;a href="https://socket.dev/blog/axios-npm-package-compromised"&gt;&lt;u&gt;Socket.dev&lt;/u&gt;&lt;/a&gt; in addition to GTIG’s free &lt;a href="https://www.virustotal.com/gui/collection/c5adea0fa8aac14e6aabd8d3d4a1d19e4cd0eb76e679f2e9d3fed2a3170c09bb/summary"&gt;&lt;u&gt;GTI Collection&lt;/u&gt;&lt;/a&gt; for registered users. Types of IoCs available include network indicators (C2 domain and IPs), file hashes (SHA256 for all platform-specific payloads and the dropper), file system artifacts by platform, YARA rules for retrospective hunting and Google Security Operations detection rules.&lt;/p&gt;&lt;p&gt;Key network indicators to block: sfrclak[.]com and 142.11.206.73 (port 8000).&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Is this related to other recent supply chain attacks?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;This attack is one of several recent open-source supply chain compromises attributed to North Korea-nexus actors. GTIG noted that UNC6780 (also known as TeamPCP) recently poisoned GitHub Actions and PyPI packages associated with projects like Trivy, Checkmarx, and LiteLLM to deploy the SANDCLOCK credential stealer and facilitate follow-on extortion operations. While UNC1069 and UNC6780 are tracked as separate threat actors, the pattern of North Korea-nexus groups targeting open-source package ecosystems represents a broader trend.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What remediation steps are available?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;The malicious axios versions (1.14.1 and 0.30.4) have been removed from the npm registry. Developers and organizations that installed either version are advised to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Downgrade to safe versions: axios@1.14.0 or axios@0.30.3&lt;/li&gt;&lt;li&gt;Remove the phantom dependency: node_modules/plain-crypto-js/&lt;/li&gt;&lt;li&gt;Block C2 traffic to sfrclak[.]com and 142.11.206.73&lt;/li&gt;&lt;li&gt;Treat affected systems as fully compromised: rotate all secrets and credentials, rebuild from clean snapshots&lt;/li&gt;&lt;li&gt;Audit CI/CD pipelines: ephemeral runners require secret rotation; self-hosted runners are treated as fully compromised&lt;/li&gt;&lt;li&gt;Search for file artifacts: /Library/Caches/com.apple.act.mond (macOS), %PROGRAMDATA%\wt.exe (Windows), /tmp/ld.py (Linux)&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;For long-term hardening, package managers now support version cooldown policies that prevent automatic installation of newly published versions:&lt;/p&gt;&lt;div class="table-responsive"&gt;&lt;table class="table"&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;&lt;strong&gt;Package Manager&lt;/strong&gt;&lt;/th&gt;&lt;th&gt;&lt;strong&gt;Setting&lt;/strong&gt;&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;npm (v11.10.0+)&lt;/td&gt;&lt;td&gt;min-release-age=7d in .npmrc&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;pnpm (v10.16+)&lt;/td&gt;&lt;td&gt;minimum-release-age=7d&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Yarn (v4.10+)&lt;/td&gt;&lt;td&gt;npmMinimalAgeGate: "7d"&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Bun (v1.3+)&lt;/td&gt;&lt;td&gt;minimumReleaseAge = 604800&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;p&gt;&lt;strong&gt;Has Tenable released any product coverage?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Yes, Tenable plugins that detect the &lt;a href="https://www.tenable.com/plugins/nessus/304406"&gt;&lt;u&gt;compromised axios npm package&lt;/u&gt;&lt;/a&gt; and the &lt;a href="https://www.tenable.com/plugins/nessus/304407"&gt;&lt;u&gt;malicious plain-crypto-js npm package&lt;/u&gt;&lt;/a&gt; are available.&lt;/p&gt;&lt;p&gt;Additionally, customers can utilize Tenable Attack Surface Management to identify public facing assets running Axios libraries by utilizing the filter &lt;em&gt;&lt;strong&gt;JavaScript Libraries contains Axios&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&lt;img src="https://www.tenable.com/sites/default/files/inline/images/tenable-attack-surface-management-axios.png" data-entity-uuid="83769d10-a032-4923-ac83-bc8ac81951bd" data-entity-type="file" alt="Screenshot of the Tenable Attack Surface Management Explore interface showing a query filtered by &amp;quot;JavaScript Libraries contains Axios.&amp;quot;" width="1200" height="619" loading="lazy"&gt;&lt;p&gt;&lt;br&gt;&amp;nbsp;&lt;/p&gt;&lt;h3&gt;Get more information&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://github.com/advisories/GHSA-fw8c-xr5c-95f9"&gt;&lt;u&gt;GitHub Advisory: GHSA-fw8c-xr5c-95f9&lt;/u&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package"&gt;&lt;u&gt;Google Threat Intelligence: North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack&lt;/u&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://snyk.io/blog/axios-npm-package-compromised-supply-chain-attack-delivers-cross-platform/"&gt;&lt;u&gt;Snyk: Axios npm Package Compromised in Supply Chain Attack&lt;/u&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://socket.dev/blog/axios-npm-package-compromised"&gt;&lt;u&gt;Socket: Axios npm Package Compromised&lt;/u&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan"&gt;&lt;u&gt;StepSecurity: Axios Compromised on npm&lt;/u&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;Join&lt;/strong&gt;&lt;/em&gt; &lt;a href="https://connect.tenable.com/category/news-you-need/discussions/vulnerability-watch"&gt;&lt;em&gt;&lt;strong&gt;&lt;u&gt;Tenable's Research Special Operations (RSO) Team&lt;/u&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt; &lt;em&gt;&lt;strong&gt;on Tenable Connect and engage with us in the&lt;/strong&gt;&lt;/em&gt; &lt;a href="https://connect.tenable.com/group/threat-roundtable"&gt;&lt;em&gt;&lt;strong&gt;&lt;u&gt;Threat Roundtable group&lt;/u&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt; &lt;em&gt;&lt;strong&gt;for further discussions on the latest cyber threats.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;Learn more about&lt;/strong&gt;&lt;/em&gt; &lt;a href="https://www.tenable.com/products/tenable-one"&gt;&lt;em&gt;&lt;strong&gt;&lt;u&gt;Tenable One&lt;/u&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;em&gt;&lt;strong&gt;, the Exposure Management Platform for the modern attack surface.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;img src="https://www.tenable.com/sites/default/files/images/articles/Axios%20npm%20Supply%20Chain%20Attack%20-%20UNC1069%20FAQ.png"&gt;
</description>
  <pubDate>Wed, 01 Apr 2026 16:11:28 -0400</pubDate>
    <dc:creator>Research Special Operations</dc:creator>
    <guid isPermaLink="true">https://www.tenable.com/210824</guid>
    </item>
<item>
  <title>Supply chain attack on Axios npm package: Scope, impact, and remediations</title>
  <link>https://www.tenable.com/blog/supply-chain-attack-on-axios-npm-package-scope-impact-and-remediations</link>
  <description>&lt;p&gt;The Axios npm package has been compromised in a supply chain attack that uploaded new versions of the package containing malicious code. Any environment that downloaded these compromised Axios versions is at risk of severe data theft, including the loss of credentials and API keys. Scan your environment now.&amp;nbsp;&lt;/p&gt;&lt;div class="blog-see-also"&gt;&lt;div class="col-sm-12"&gt;&lt;h2&gt;Key takeaways&lt;/h2&gt;&lt;ol&gt;&lt;li&gt;This incident is a confirmed supply chain attack. The presence of malicious Axios versions (1.14.1 or 0.30.4) signifies a confirmed security breach rather than a potential risk. Organizations must move beyond “patching” and initiate full incident response playbooks for any host where these packages are detected.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;If affected, organizations must immediately quarantine hosts, apply incident response playbooks, and rotate all exposed secrets. In the last supply chain attacks we observed, attackers were very quick to abuse any exposed secrets, credentials, or API keys, usually abusing them a couple of hours after leakage. This highlights how short the window is for response for defenders.&lt;br&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Because these attacks will keep happening, passive defense is insufficient. Organizations must implement strict security measures — such as minimum package age policies, pinning dependencies, auditing lockfiles, and actively scanning environments — to protect against the next inevitable supply chain compromise.&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;/div&gt;&lt;h2&gt;Introduction: Axios supply chain compromise&amp;nbsp;&lt;/h2&gt;&lt;p&gt;A critical software supply chain attack compromised “Axios,” a highly popular npm package with over 100 million weekly downloads, commonly used as a promise-based HTTP client for the browser and Node.js.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Attackers successfully hijacked a maintainer account and embedded a hidden, malicious dependency into two newly published versions of Axios. The attacker injected a malicious package called “plain-crypto-js” into the dependency tree of the Axios package. The package “plain-crypto-js” utilized a postinstall script to execute a remote access trojan (RAT) dropper during the installation process.&lt;/p&gt;&lt;p&gt;Because the embedded malware executes immediately upon installation of this highly popular NPM package, the scope of this breach is potentially massive. &lt;strong&gt;Any environment that downloaded these compromised versions of Axios is at risk of severe data theft, including the loss of credentials and API keys.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;For additional information on this compromise, see our follow-up blog: &lt;a href="https://www.tenable.com/blog/faq-about-the-axios-npm-supply-chain-attack-by-north-korea-nexus-threat-actor-unc1069" target="_blank"&gt;Axios npm Supply Chain Attack by North Korea-Nexus Threat Actor UNC1069&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;&lt;p&gt;See how recent supply chain attacks are creating a &lt;a href="https://www.tenable.com/blog/the-developer-credential-economy-exposure-data-is-the-new-front-line-in-the-supply-chain-war" target="_blank"&gt;black market for highly privileged developer credentials&lt;/a&gt;.&lt;/p&gt;&lt;h2&gt;Frequently asked questions (FAQs) about Axios supply chain attack&lt;/h2&gt;&lt;h3&gt;When was the Axios npm package first compromised?&lt;/h3&gt;&lt;p&gt;The first malicious versions of Axios were uploaded on March 31, 2026 at 1 AM UTC.&lt;/p&gt;&lt;h3&gt;What happened? What did threat actors do?&amp;nbsp;&lt;/h3&gt;&lt;p&gt;Attackers hijacked the npm account of Axios’s lead maintainer and published two malicious versions of the Axios package: version “1.14.1” and version “0.30.4”.&lt;/p&gt;&lt;p&gt;Rather than altering Axios’s source code, they added “plain-crypto-js@4.2.1” as a dependency for the Axios package.&lt;/p&gt;&lt;p&gt;Installing “plain-crypto-js” automatically executes a double-obfuscated Node.js dropper (setup.js) using npm’s postinstall lifecycle hook. “postinstall” hooks can be used to execute code during the installation process. This is a very common technique used by malicious npm packages that we expect to see more and more in the future.&lt;/p&gt;&lt;p&gt;Once deobfuscated, the dropper identified the victim’s host operating system and reached out to the attacker’s command and control (C2) server (sfrclak[.]com:8000) to pull a second-stage payload.&lt;/p&gt;&lt;p&gt;The second stage payload is a RAT tailored to the OS, supporting MacOS, Windows, and Linux.&lt;/p&gt;&lt;h3&gt;Has the Axios developer addressed this issue?&lt;/h3&gt;&lt;p&gt;All of the malicious versions of Axios have been removed from the public registry. It is now safe to install new versions of Axios.&lt;/p&gt;&lt;h3&gt;How can I tell if I’m running malicious versions of Axios?&amp;nbsp;&lt;/h3&gt;&lt;p&gt;To determine if you are affected, scan your environment for the presence of the malicious versions of the affected packages. Look specifically for versions 1.14.1 and 0.30.4 and these other indicators of compromise (IOCs):&lt;/p&gt;&lt;div class="table-responsive"&gt;&lt;table class="table"&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/th&gt;&lt;th&gt;&lt;strong&gt;IOC&lt;/strong&gt;&lt;/th&gt;&lt;/tr&gt;&lt;tr&gt;&lt;th&gt;Infected Package&lt;/th&gt;&lt;th&gt;Name: “Axios”&lt;br&gt;Version: “1.14.1”&lt;/th&gt;&lt;/tr&gt;&lt;tr&gt;&lt;th&gt;Infected Package&lt;/th&gt;&lt;th&gt;Name: “Axios”&lt;br&gt;Version: “0.30.4”&lt;/th&gt;&lt;/tr&gt;&lt;tr&gt;&lt;th&gt;Infected Package&lt;/th&gt;&lt;th&gt;&lt;p&gt;Name: “plain-crypto-js”&lt;/p&gt;&lt;p&gt;Version : all&lt;/p&gt;&lt;/th&gt;&lt;/tr&gt;&lt;tr&gt;&lt;th&gt;SHA256 of Javascript dropper named “setup.js”&lt;/th&gt;&lt;th&gt;e10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09&lt;/th&gt;&lt;/tr&gt;&lt;tr&gt;&lt;th&gt;Attacker C2 Domain&lt;/th&gt;&lt;th&gt;sfrclak[.]com&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;/table&gt;&lt;/div&gt;&lt;p&gt;The presence of the vulnerable versions in the filesystem likely means that it was installed using the npm package manager, and therefore, infected the relevant host.&amp;nbsp;&lt;/p&gt;&lt;p&gt;That’s why you should treat any system where you find malicious versions of Axios as fully compromised and immediately implement relevant incident response and containment playbooks.&lt;/p&gt;&lt;p&gt;If affected, organizations must immediately quarantine hosts, apply incident response playbooks, and rotate all exposed secrets. In the last supply chain attacks we observed, attackers were very quick to abuse any exposed secrets, credentials, or API keys, usually abusing them a couple of hours after leakage. This highlights how short the window is for response for defenders.&lt;/p&gt;&lt;p&gt;Because these attacks will keep happening, passive defense is insufficient. Organizations must implement strict security measures — such as minimum package age policies, pinning dependencies, auditing lockfiles, and actively scanning environments — to protect against the next inevitable supply chain compromise.&lt;/p&gt;&lt;h3&gt;How can Tenable help me address the supply chain attack on the Axios npm package?&amp;nbsp;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://www.tenable.com/blog/supply-chain-attack-on-axios-npm-package-scope-impact-and-remediations" target="_blank"&gt;Tenable One&lt;/a&gt; continuously, automatically, and proactively detects the malicious versions of Axios across both on-premises and cloud environments.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.tenable.com/products/nessus" target="_blank"&gt;Tenable Nessus&lt;/a&gt; and &lt;a href="https://www.tenable.com/cloud-security/products/cnapp" target="_blank"&gt;Tenable Cloud Security&lt;/a&gt;, both part of the Tenable One Exposure Management platform, continuously monitor for new indicators of compromise (IOCs) and track research associated with this evolving campaign.&lt;/p&gt;&lt;p&gt;A list of Tenable plugins to identify the malicious package will appear here as soon as they're released:&lt;/p&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://www.tenable.com/plugins/nessus/304406"&gt;axios&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.tenable.com/plugins/nessus/304407"&gt;plain-crypto-js&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;Tenable Cloud Security classifies affected packages as malicious. Detected packages will appear in your Tenable console environment the next time data is synced.&lt;/p&gt;&lt;p&gt;For more information on remediations, see our follow-up blog: &lt;a href="https://www.tenable.com/blog/faq-about-the-axios-npm-supply-chain-attack-by-north-korea-nexus-threat-actor-unc1069" target="_blank"&gt;Axios npm Supply Chain Attack by North Korea-Nexus Threat Actor UNC1069&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;&lt;h2&gt;Conclusion&lt;/h2&gt;&lt;p&gt;This security incident affecting the Axios npm package is a critical reminder that massive software supply chain attacks remain a recurring threat. Threat actors continuously exploit the trust in open source ecosystems to get around organizations’ traditional, perimeter-based security controls and deliver malicious software at scale.&lt;/p&gt;
&lt;img src="https://www.tenable.com/sites/default/files/images/articles/Tenable%20Research%20Axios%20npm%20package%20supply%20chain%20attack.png"&gt;
</description>
  <pubDate>Tue, 31 Mar 2026 14:20:00 -0400</pubDate>
    <dc:creator>Ron Popov</dc:creator>
    <guid isPermaLink="true">https://www.tenable.com/210820</guid>
    </item>

  </channel>
</rss>
