SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsOn March 31, 2026, attackers compromised the official Axios package on the Node Package Manager (npm) registry. Axios is one of the most widely used open-source libraries for making web requests, with over 100 million downloads per week. It is embedded in web applications, mobile apps, backend services, and automated build pipelines across virtually every industry. In a briefing filmed earlier this week, SANS instructors analyze the Axios supply chain attack and provide guidance to help organizations identify exposure and respond. Several blogs provide additional information.
Please note that this supply chain attack also drops a RAT on Win/Mac/Linux developer workstations. Please go through and scrub for the IOCs on OS and DNS, even if EDR did not alert. Some places I’m working with discovered they were infected by looking at the dev workstations using MDM/EDR to look for those IOCs, 1-2 days after thinking they were clear from the SDLC ecosystem side. This is tricky stuff, give yourself a stronger detection chance by looking everywhere.The other piece to this is on the remediation: What secrets were possibly stolen, and how do we prioritize secret rotation, while not bringing down important systems that rely on those secrets? SDLC prevention is a whole other comment.

This was a startling and audacious attack. Thankfully, it was found quickly and IOCs and various defenses were available fast. The SANS emergency webcast on the topic that same day was super helpful in figuring out what happened and what real-world defenders need to do about it. Information about altering development practices and CI/CD pipelines was particularly useful and could help put some limit on similar attacks in the future.

If you do nothing else make sure you're on the updated versions of Axios post haste. Note you need to remove the node_modules/plain-crypto-js directory. Better still, read the blog from Josh Wright: he lists things your developers, Blue Team and incident responders need to do. Even better than that, watch the SANS Emergency Briefing on Axios to get the full story on this compromise.

The Axios breach has many things to look at if you are working with CI/CD. The infection chain was very well planned and has a lot of interesting artifacts. The fact that it targeted Windows, Mac, and Linux is fascinating. Simple infection chains but very effective. The way it hidden by changing the package.json and creating a version of it that looked “clean” instead of the infected version is also interesting. The attack chain started 18 hours before the initial changes to the repo. This was a well-thought-out attack. So far “only” 135 infections but that is also because the total compromise time was 3 hours.
SANS
SANS
SANS
Wiz
Microsoft
Help Net Security
SecurityWeek
SC Media
Apple is releasing updates for older versions of iOS to address the vulnerabilities exploited in the DarkSword exploit kit. The decision marks a shift from the company's earlier position: initially, Apple released updates for older versions of iOS to protect users whose devices were incompatible with iOS 26. Users with newer hardware were advised to upgrade to the newest version of the mobile operating system. Apple has updated the related security advisory with this note: "We enabled the availability of iOS 18.7.7 for more devices on April 1, 2026, so users with Automatic Updates turned on can automatically receive important security protections from web attacks called DarkSword. The fixes associated with the DarkSword exploit first shipped in 2025." The shift in Apple's stance is likely related to the seriousness of the recently discovered DarkSword and Coruna exploit kits.

If you have any devices on iOS 18 get them on 18.7.7. This is serious. Then get them replaced with iOS 26 compatible devices. Don’t forget the devices in storage or otherwise seldom used.

Remember, if you have a mobile device fleet that include Apple devices, either issued by corporate or Bring Your Own Device, it is important to ensure that you have them as part of a Mobile Device Management platform so you can ensure they are updated in a timely manner. Relying on users to upgrade is not a viable vulnerability management strategy.
AAPL is recognizing that they still have a significant number of product users on the older iOS version that need protection. MSFT has done this as well in the past. While there is every reason for users to move to the newest version of an operating system, inertia and business applications mostly get in the way. It is what it is.

Apple, for security reasons, does not promise to support its hardware forever. Users of unsupported hardware and software should assume that this is a one-off. They should not expect Apple to do this ever again, much less that it will do it routinely. Apple publishes the end-of-support dates for all hardware. Obsolete Apple devices should not be used for sensitive applications in today's hostile environment. Hardware is cheap; stay current.

Apple is taking this exploit chain seriously to go back and back port these updates. Keep your phones patched.
Apple
WIRED
Help Net Security
The Hacker News
BleepingComputer
SecurityWeek
On Tuesday, March 31, 2026, Anthropic accidentally published the source code for their agentic command-line tool Claude Code within version 2.1.88 released on npm, due to the inclusion of a source map file intended for debugging. While Anthropic removed the affected package within hours and is issuing DMCA takedowns for copies of it, the codebase comprising over half a million lines of code has been leaked, prompting analysis of its contents and speculation about unreleased features it seems to contain. Exploiting both the leak and the speculation, malicious repositories on GitHub and typosquatted empty packages on npm are already appearing, mimicking Claude Code files to lure users seeking the leaked source code. Zscaler reports that the fraudulent GitHub packages claim to be a working fork with "unlocked" features, but deliver the Vidar infostealer, GhostSocks proxy malware, and remote access trojans (RATs). Zscaler's blog post highlights that the leak creates risk of supply chain attacks, streamlined exploitation of existing and new flaws, and compromise of local environments and developer workstations when users run the leaked code. Notably but unconnectedly, this leak happened at the same time as the Axios npm supply chain attack, meaning users who downloaded or updated Claude Code via npm between 00:21 and 03:29 UTC on March 31 may have received a trojanized version of the Axios client in Claude Code's dependencies.

While this would be a good time to advise any downloaded copy’s of Claude code be checked to ensure they are legitimate, that is not public code and you need to make sure it’s a licensed copy. Beyond that, grab the IoCs to make sure that you’re not impacted and have conversations about how AI agents and source code downloads are protected and verified.

Use this new item for a tabletop “Could this happen to us?” SecDevOps exercise if you have proprietary source code.

I would not suggest running Claude Code that has been leaked. There are too many opportunities for this to be backdoored.
Never ever underestimate the resourcefulness of the miscreant. Suffice it to say, the cybersecurity community will be dealing with this supply chain risk well into 2027.
Zscaler
The Register
The Hacker News
BleepingComputer
BleepingComputer
On March 25, 2026, Google proposed 2029 as a new target for migrating to post-quantum cryptography (PQC), and announced added support for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA) in Android 17 beta. The US National Institute of Standards and Technology (NIST) standardized ML-DSA in August 2024 to protect against quantum computing threats. While 2029 is "ambitious," in Google's words, similar deadlines have been put forth in recent years: NIST estimated in 2016 that a "Cryptographically Relevant Quantum Computer" (CRQC) capable of breaking RSA encryption in hours could be possible as early as 2030; in 2022 the NSA recommended exclusive use of CNSA 2.0 (a suite of post-quantum algorithms) by 2030 or 2033 depending on the system; Microsoft aims for full PQC transition by 2033; and the UK's National Cyber Security Centre proposes PQC readiness by 2035. According to Google, asymmetric encryption, digital signatures, and certain other techniques may become vulnerable to "store-now-decrypt-later" attacks using CRQCs, but symmetric cryptography is unlikely to be affected. Two non-peer-reviewed white papers published in March 2026 — one by CalTech researchers and one by Google — suggest that elliptic curve cryptography (ECC), implemented for cryptocurrency among other uses, could be breakable by a quantum computer with resources smaller by orders of magnitude than previously theorized. Google has not publicly released the details of its improvements to Shor's algorithm due to "escalating risk that detailed cryptanalytic blueprints could be weaponized by adversarial actors." Google's paper and secrecy have drawn criticism for alarmism, focus on cryptocurrency over other PQC priorities, and conflict with their own strict disclosure policies.

Our guidance in our consultancy is to advise everyone to move to OpenSSH 10 at a minimum and TLS 1.3. It will be harder with Windows endpoints than others, however; start the process now. We still see clients using TLS 1.0. We have been fortunate that TLS hasn’t been able to be widely exploited but those days are slowly ending.

This is a useful reminder that organisations should not treat post-quantum cryptography as a distant problem. While some of the timelines discussed remain speculative, the “store now, decrypt later” risk is very real today. Organisations, particularly those that are regulated for example by the EU GDPR etc., should start planning for post-quantum cryptography migration rather than waiting for firm deadlines.

Google’s emphasis on prioritizing PQC migration for authentication services is definitely timely and appropriate. We don’t want to end up with strong authentication relying on trivial encryption – remember the early risks of NTLM over the Internet?

For most people, this is interesting but not compelling; updates will come. If, however, you work in a highly sensitive industry where store-now-decrypt-later presents measurable business risk, challenge your developers to move to PQC algorithms quickly.
The threat of a CRQC is becoming real given the announcement by GOOG. As pointed out in their research paper, the threat to ECC based cryptographic systems is nearer than originally thought. Organizations that have systems based on ECC should start planning for migration to PQC based algorithms now.

A little proportionality is indicated here. PQC is for highly sensitive, long-lived data where "store now decrypt later" (SNDL) attacks are likely to be efficient. Most of the data that we encrypt has a very short life. While nation states will clearly employ quantum computing for cryptanalysis, its use will be sparse and expensive for at least another decade. Even with quantum computing, Google talks about solving for an RSA private key in hours to days. Think about the number of RSA keys that we create every day, much less the number that are already in use. RSA will continue to be useful, efficient, and used for a very long time. If you are not already aware that your data is vulnerable to SNDL attacks, then it is almost certain that it is not.
Dark Reading
Ars Technica
Infosecurity Magazine
Ars Technica
SecurityWeek
A water treatment facility for the city of Minot, North Dakota has disclosed a ransomware attack. While the incident did not affect the safety of the city's water supply, employees at the Minot Water Treatment Plant reverted to manual procedures for approximately 16 hours in mid-March 2026. The attack affected the facility's Supervisory Control and Data Acquisition (SCADA) server; that server has been replaced. The facility serves roughly 80,000 people in a region known as the Northwest Area Water Supply.

“We switched to manual operations” should not be viewed as a success condition but rather as a last line of defense. Sixteen hours of manual control means operators were carrying the full burden of safety, monitoring, and decision-making without the automated control systems they rely on every day. That works for a while, yet it does not scale and it introduces human fatigue into a safety-critical process. The more concerning detail is that a ransomware event reached a SCADA server. That points to a breakdown in separation between business IT and control systems, or at least a pathway that should not have been available. Critical control functions need to be designed so that compromise of enterprise IT systems cannot propagate into the operational environment, and recovery should not depend on replacing core control infrastructure while under incident handling pressures.

With the increased targeting of civilian critical infrastructure in regional conflicts, organisations need to recognise that geography offers little protection in cyberspace. While physical attacks are constrained by location, cyberattacks are not. Operators of critical infrastructure, regardless of where they are based, should assume they could become targets and ensure appropriate security controls, monitoring, and resilience measures are in place to defend against such threats.

While the attack seems to be contained to the server that collected gauge readings, a concern is now how to prevent introduction of ransomware in the future. The good news is they are not only able to fail back to manual gauge reading but also that those reads are regularly performed anyway but at a much larger interval, which means staff is already trained on how to fail back and use that data appropriately. Make sure you optimize staff training and resources for success for failover scenarios.

The encouraging piece of this story is that reversion to manual practices worked. If I were responsible for critical infrastructure, I'd write, "Can we survive Volt Typhoon?" on my bathroom mirror.
Klaxons should be sounding across the country to the threat on one of our most critical infrastructures. It’s time for the government to put money behind its words (i.e., national cyber strategy) and help municipalities implement an effective cybersecurity program.
This week, Cisco released updates to address nine vulnerabilities, including two critical flaws: an arbitrary command execution vulnerability in Cisco Smart Software Manager On-Prem (CVE-2026-20160) that is due to the unintentional exposure of an internal service and could be exploited to execute commands on the operating system with root privileges; and an authentication bypass vulnerability in Cisco Integrated Management Controller (CVE-2026-20093) that is due to incorrect handling of password change requests and could allow an attacker to attain system access with elevated privileges. Other fixed issues include three high-severity vulnerabilities in Cisco Evolved Programmable Network Manager, Cisco Smart Software Manager On-Prem, and Cisco Integrated Management Controller, and four medium-severity vulnerabilities. Users are urged to update to the most current versions of affected products.

Timely patching is part of the cost of doing business.
The Hacker News
SecurityWeek
BleepingComputer
Cisco
Cisco
Cisco
On Tuesday, March 31, Google updated the Chrome stable channel for desktop to 146.0.7680.177/178 for Windows/Mac and 146.0.7680.177 for Linux. The updated version of the browser includes fixes for 21 security issues, 19 of which are rated high severity. One of the vulnerabilities, a use-after-free issue in the WebGPU implementation Dawn in Chrome (CVE-2026-5281), is being actively exploited. The vulnerability can be exploited to crash browsers, corrupt data, cause other problems, including rendering issues. This marks the fourth zero-day Google has patched in Chrome since the start of the calendar year.

Anyone else having Adobe Flash flashbacks? Hopefully your regimen of browser restarts and updates is hands off. Remember: “Trust but verify.”

Maintenance of browsers is continuous and their stability and trust are low. Their presence and use is pervasive and their application broad, unpredictable, and otherwise risky. Prefer purpose-built clients for mission critical applications.
Help Net Security
Heise
The Hacker News
BleepingComputer
Google Blog
While the Jaguar Land Rover cybersecurity incident in August/September 2025 made headlines with its astronomical costs and repercussions throughout the industry, it was not the only manufacturing sector breach in the UK last year. According to a report from ESET, 78 percent of manufacturers in the UK have experienced at least one cybersecurity incident within the last year; more than half said the incidents caused financial losses. Of those, more than 50 percent reported losses greater than £250,000, and nearly 20 percent reported losses of more than £1 million. Of companies reporting downtime as the result of cyber incidents, more than three-quarters reported downtime of between one and seven days. More than 20 percent of respondents said their organizations are operating with reactive rather than proactive cybersecurity incident measures, with roughly the same percentage placing accountability with the organization's board or executive leadership. The study comprises responses from 500 decision makers in the UK's manufacturing sector.

The findings in this report reinforce that cyber incidents are no longer exceptional but expected. It is therefore worrying to see that many organisations, and not just in the manufacturing sector, remain reactive to cyber threats. Cybersecurity needs to be embedded at board level and treated as a business risk and not as an IT risk. With increasing cybersecurity-related regulatory pressure, particularly across the EU and UK, organisations that fail to mature their security posture will face both operational and compliance risks and their board members can face personal liability.
This report should be a wake-up call for the manufacturing industry. If the UK manufacturing industry doesn’t already have an Information Sharing and Analysis Center (ISAC), they should. It’s a great way to share threat intelligence specific to that sector and perhaps more importantly, security best practices.

"An ounce of prevention..." While timely patching is necessary, its cost is high and continuous. Not so for strong authentication and structured networks.
Infosecurity Magazine
The Register
Industrial Cyber
ESET
Michigan-based medical technology company Stryker says it is now fully operational following a wiper attack last month. Starting on March 11, 2026, attackers began wiping company devices through a Global Administrator account created following the compromise of a Windows domain admin account. In all, more than 80,000 devices were wiped. In a statement on April 1, 2026, the company says "they are fully operational across [their] global manufacturing network." Stryker is continuing to work with third-party experts, law enforcement, and industry partners to better understand and learn from the experience.

Make sure you read through the latest guidance on how to protect your Global Administrator accounts. These accounts are equivalent to Domain Admin but I still find companies that use their Global Admin access on day-to-day accounts, or through the default PIM settings which are set to expire every 12 hours. The current guidance we provide is separate Global Admin accounts with 1-hour expirations for both token lifetimes. Guard these accounts.

Less than a month to restore operations is commendable. Note they are still forensically examining the breach which means more information is pending about what was exposed/exfiltrated. Hopefully that will complete quickly as well.

Organisations should use this breach as a learning opportunity and build this scenario, or similar scenarios where all their IT devices are wiped, to create more robust cyber resilience solutions.
Rhode Island-based toy maker Hasbro has disclosed a cybersecurity incident that prompted the company to take some of its systems offline. In a filing with the US Securities and Exchange Commission, Hasbro writes that it identified unauthorized access to its network on March 28, 2026. Hasbro has brought in third-party cybersecurity experts to help with the investigation. The company also notes that it "has implemented and continue[s] to implement business continuity plans to enable it to continue to take orders, ship products and conduct other key operations while it resolves this situation," and that these measures may be in place for several weeks, potentially causing operational delays.

While Hasbro has responded quickly, and I don’t envy them being in this position. The unanswered question is, have they taken steps to prevent recurrence? Beyond implementing your response plan, you need to assure customers and employees you have taken measures to contain/eradicate and prevent recurrence. Even if you haven’t done these things, you should be talking about how you will be (quickly) doing them.
First comes the announcement, then the loss of PII, then the commitment to cybersecurity. What’s slightly different in this case is that Hasbro is a Fortune 500-600 company. One would think that they have sufficient resources allocated to cybersecurity.
SANS Internet Storm Center StormCast Friday, April 3, 2026
Vite Exploits; OpenSSH 10.3; Claude Code Vuln
https://isc.sans.edu/podcastdetail/9878
Attempts to Exploit Exposed "Vite" Installs (CVE-2025-30208)
https://isc.sans.edu/diary/Attempts+to+Exploit+Exposed+Vite+Installs+CVE202530208/32860
OpenSSH 10.3 Release
https://seclists.org/oss-sec/2026/q2/7
Claude Code Vulnerability
https://adversa.ai/claude-code-security-bypass-deny-rules-disabled/
SANS Internet Storm Center StormCast Thursday, April 2, 2026
Script Removing ADS/MotW; Google Chrome 0-Day; iOS/iPadOS 18 Update
https://isc.sans.edu/podcastdetail/9876
Malicious Script That Gets Rid of ADS
https://isc.sans.edu/diary/Malicious+Script+That+Gets+Rid+of+ADS/32854
Google Chrome Update fixes 21 Vulnerabilities and 0-Day
https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html
Apple Addresses Darksword Vulnerabilities for older devices
https://support.apple.com/en-us/126793
SANS Internet Storm Center StormCast Wednesday, April 1, 2026
Application Control Bypass; Axios NPM Module Compromise; TeamPCP vs Cloud
https://isc.sans.edu/podcastdetail/9874
Application Control Bypass for Data Exfiltration
https://isc.sans.edu/diary/Application+Control+Bypass+for+Data+Exfiltration/32850
Axios NPM Module Supply Chain Compromise
TeamPCP vs. Cloud Resources
https://www.wiz.io/blog/tracking-teampcp-investigating-post-compromise-attacks-seen-in-the-wild
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
AI adoption across tools, apps, and agents is outpacing governance. Risk sits inside prompts, responses, and agent behavior, where sensitive data can leak. Join Cato on April 14 at 11 AM ET / 8 AM PT to learn how to discover Shadow AI, enforce prompt and response guardrails, and protect AI applications and agents at runtime.
Webinar | Risk-Adaptive DLP Strategy Guide | Monday, May 18, 2026, at 3:30 PM.
SANS 2026 Threat Hunting Survey: The Evolution of Threat Hunting. Share how you are implementing and maturing threat hunting programs, including methodologies, tools, data sources, team structures, and the challenges hunters face in modern environments.
Webinar | When Trusted Senders Become Threats: Stopping BEC and Supply Chain Attacks with Self-Learning AI | Monday, April 27, at 10:30 AM ET.