Insights into how detection holds up in real environments and how changing attacker tactics impact your team’s response capabilities.
April 1, 2026
—
Lucie Cardiet
and
Breaking down the axios supply chain incident
A compromised npm package is only the entry point. The axios incident shows how quickly attackers pivot from code execution to credential abuse, identity misuse, and cloud access.
Prompt Control: How Context Becomes the Command-and-Control Layer for AI Agents
Prompt control turns AI agents into command-and-control systems by manipulating context, memory, and inputs—enabling persistent, stealthy attacker control through normal agent behavior.