Technology ❯ Cybersecurity ❯ Cyberattacks ❯ Supply Chain Attacks
The breach began with a fake npm 2FA reset that let attackers push malicious updates to widely used libraries.