Ax Sharma's Avatar

Ax Sharma

@axsharma.com

Journalist and Security Researcher. Bylines/seen on: BleepingComputer, BBC, Channel 5, TechCrunch, WIRED. ๐Ÿ“๐Ÿ‡จ๐Ÿ‡ฆ | ๐Ÿ‡ฌ๐Ÿ‡ง | ๐Ÿ‡ฎ๐Ÿ‡ณ www.axsharma.com X/Twitter: @Ax_Sharma

540
Followers
360
Following
60
Posts
03.08.2023
Joined
Posts Following

Latest posts by Ax Sharma @axsharma.com

Absolutely, it's notable, and we can acknowledge that without the FUD or exaggerated claims.

19.02.2026 02:58 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Some posts have cited "5 million machines." That's simply Cline's total install milestone from Jan 30, not the number exposed to the Feb 17 update...

This was a contained, low-impact incident, but still a useful reminder about supply chain security. We can stay and keep others aware, without FUD ๐Ÿ™‚

19.02.2026 02:10 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

The GitHub advisory mentions "an unauthorized party" which can confuse attribution and social media posts got it wrong.

The Feb 17 npm publish misused a long-lived token and was quickly patched in v2.4.0.

There's no evidence of widespread compromise or "ongoing" malicious activity.

19.02.2026 02:10 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Yes, the incident involved "unauthorized publishing" - it did not deliver a destructive payload or compromise widespread endpoints.

Researcher Adnan Khan had disclosed a proof-of-concept vulnerability on Feb 9, 2026, responsibly, on a mirror repo. He did NOT publish the compromised package.

19.02.2026 02:10 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Advisory clarifies only cline@2.3.0 on npm was affected for ~8 hours.

The version included a postinstall script installing OpenClaw, which is a legitimate/benign open source package, not malware. Rest of the CLI code was unchanged.

19.02.2026 02:10 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 0
Preview
Unauthorized npm publish of Cline CLI cline@2.3.0 with modified postinstall script to install openclaw ### Description On February 17, 2026 at 3:26 AM PT, an unauthorized party used a compromised npm publish token to publish an update to Cline CLI on the NPM registry: cline@2.3.0. The published pac...

โš ๏ธ Seeing a lot of exaggerated or misleading posts about the recent Cline CLI supply chain incident, so hereโ€™s some context.

Feb 17 incident is clearly documented in the low-severity advisory: github.com/cline/cline/...

19.02.2026 02:10 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Extensive dataset contains: names, emails, phone numbers, addresses, IPs, purchase history, and partial payment card data.

Even without full card numbers, the data can fuel targeted #phishing and fraud campaigns.

Beware if you receive suspicious communications appearing to come from Canada Goose.

16.02.2026 05:13 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Canada Goose investigating as hackers leak 600K customer records ShinyHunters, a well-known data extortion group, claims to have stolen more than 600,000 Canada Goose customer records containing personal and payment-related data. Canada Goose told BleepingComputer ...

The company says it's seen no evidence of a recent breach of its own systems, and the data relates to historical customer transactions: www.bleepingcomputer.com/news/securit...

16.02.2026 05:13 ๐Ÿ‘ 1 ๐Ÿ” 2 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 0
Post image Post image

Canada Goose says it is reviewing a 1.67 GB dataset leaked by ShinyHunters extortion group, with more than 600,000 customer records.

16.02.2026 05:13 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image Post image

Restaurants are going cash-only, and utility payments are disrupted. The City of Palm Bay, FL and City of Frisco, TX both reported inability to accept online credit card payments. Other organizations, including Lightspeed Commerce and ThriftTrac, have also reported service impacts.

07.02.2026 10:38 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Payments platform BridgePay confirms ransomware attack behind outage A major U.S. payment gateway and solutions provider says a ransomware attack has knocked key systems offline, triggering a widespread outage affecting multiple services. The incident began on Friday a...

๐Ÿšจ Nationwide payment card-processing outage tied to #ransomware attack.

Payments platform BridgePay confirms a #ransomware attack has knocked key systems offline, impacting merchants and municipal services across the U.S.
www.bleepingcomputer.com/news/securit...

07.02.2026 10:38 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Zendesk spam wave returns, floods users with 'Activate account' emails A fresh wave of spam is hitting inboxes worldwide, with users reporting that they are once again being bombarded by automated emails generated through companies' unsecured Zendesk support systems. Som...

Despite #Zendesk suggesting safeguards and tightening up security last month, the massive spam wave has returned flooding inboxes with hundreds of bogus 'Activate account...' emails that bypass #spam filters

www.bleepingcomputer.com/news/securit...

05.02.2026 10:29 ๐Ÿ‘ 2 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
When responsible disclosure becomes unpaid labor An incentive gap is undermining responsible disclosure. For CISOs, this is gradually evolving into a risk management nightmare.

Responsible disclosure is built on an assumption that "doing the right thing" would = timely action, fair treatment, and maybe a bounty reward.

Lately, that assumption is collapsing.

For CISOs, this is gradually becoming a risk management nightmare.
www.csoonline.com/article/4124...

02.02.2026 15:32 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
NationStates confirms data breach, shuts down game site NationStates, a multiplayer browser-based game, has confirmed a data breach after taking its website offline earlier this week to investigate a security incident.

A NationStates game player found a critical vulnerability but then crossed a line: he copied production data and app code.

Finding a flaw is enough. Demonstrate it safely, report it and stop there. Holding data isn't clever, ever.
www.bleepingcomputer.com/news/securit...

02.02.2026 10:15 ๐Ÿ‘ 1 ๐Ÿ” 3 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Pax8 email sent out yesterday from an account manager accidentally contained a spreadsheet with data on 1,800 MSP partners.

Pax8 email sent out yesterday from an account manager accidentally contained a spreadsheet with data on 1,800 MSP partners.

Such data can expose who runs what, at what scale, and when contracts renew.

This serves as prime intel, not just for competitors/customer poaching, but threat actors aiming to launch targeted phishing, BEC and extortion attacks.

14.01.2026 12:19 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Cloud marketplace Pax8 accidentally exposes data on 1,800 MSP partners Cloud marketplace and distributor Pax8 has confirmed that it mistakenly sent an email to fewer than 40 UK-based partners containing a spreadsheet with internal business information, including MSP cust...

BREAKING: Threat actors are seeking data on ~1,800 MSPs after a Pax8 spreadsheet with customer and Microsoft licensing info was accidentally emailed to over three dozen partners yesterday.
www.bleepingcomputer.com/news/securit...

14.01.2026 12:19 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Especially problematic when these comments contain official lnkd[.]in shortener links and link previews don't load fully at times.

You'd have no definitive way of knowing that these are phishing at a first glance until you click!

13.01.2026 15:56 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Convincing LinkedIn comment-reply tactic used in new phishing Scammers are flooding LinkedIn posts with fake "reply" comments that appear to come from the platform, warning of bogus policy violations and urging users to click external links. Some even abuse Link...

Heads up: A new #phishing campaign is abusing LinkedIn comment-replies and directing users to external links to lift a bogus "temporary restriction."
www.bleepingcomputer.com/news/securit...

13.01.2026 15:56 ๐Ÿ‘ 2 ๐Ÿ” 2 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 0

This can compromise your privacy, particularly when using Telegram in restrictive countries to bypass censorship.

Telegram downplays the design flaw, but will warn users about proxy links with a note.

Tapping a @username, should open that user's profile, not take you to a sus link ๐Ÿคทโ€โ™‚๏ธ

13.01.2026 13:53 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Hidden Telegram proxy links can reveal your IP address in one click A single click on what may appear to be a Telegram username or harmless link is all it takes to expose your real IP address to attackers due to how proxy links are handled. Telegram says it will add w...

โš ๏ธ Telegram privacy alert: Don't tap any @usernames or links in chats. These can actually be hidden proxy URLs. Tapping them just once can trigger a direct connection that reveals your real IP address to a third party with one click:
www.bleepingcomputer.com/news/securit...

13.01.2026 13:53 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Target employees confirm leaked code after โ€˜acceleratedโ€™ Git lockdown Multiple current and former Target employees confirmed that leaked source code samples posted by a threat actor match real internal systems. The company also rolled out an "accelerated" lockdown of it...

Update: Multiple current and former Target employees have reached out to confirm that the source code and documentation shared by a threat actor match real internal systems.

A company-wide Slack announcement also announced "accelerated" access changes.
www.bleepingcomputer.com/news/securit...

13.01.2026 13:36 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image Post image

We shared the materials with Target, after which the sample data disappeared and access to git[.]target[.]com was restricted. The dataset advertised by the actor is claimed to be ~860 GB in size. Target went silent after we shared evidence and links to the Gitea repos suggesting a possible breach.

12.01.2026 17:59 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Target's dev server offline after hackers claim to steal source code Hackers are claiming to be selling internal source code belonging to Target Corporation, after publishing what appears to be a sample of stolen code repositories on a public software development platf...

EXCLUSIVE: Target's developer Git server went offline shortly after hackers claimed they had stolen internal source code and published what they claim are sample repositories for sale.
www.bleepingcomputer.com/news/securit...

12.01.2026 17:59 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Are Copilot prompt injection flaws vulnerabilities or AI limits? Microsoft has pushed back against claims that multiple prompt injection and sandbox-related issues raised by a security engineer in its Copilot AI assistant constitute security vulnerabilities. The de...

Microsoft Copilot prompt injectionsโ€”vulnerabilities or AI limits?
Microsoft implies that these don't constitute "serviceable vulnerabilities." But security pros are divided, especially when AIs like Claude restrict inputs that can cause system prompt leaks.
www.bleepingcomputer.com/news/securit...

06.01.2026 11:34 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Tech Startups Are Handing Out Free Nicotine Pouches to Boost Productivity A nicotine replacement for smokers has started popping up in offices in the tech industry, despite health hazards.

What an awful perk this is...it's saying "hey, get addicted to nicotine so we can squeeze more ideas out of you."

Tech Startups Are Handing Out Free Nicotine Pouches to Boost Productivity
www.wsj.com/tech/tech-st...

01.01.2026 20:54 ๐Ÿ‘ 35 ๐Ÿ” 12 ๐Ÿ’ฌ 4 ๐Ÿ“Œ 6
Preview
Not all CISA-linked alerts are urgent: ASUS Live Update CVE-2025-59374 An ASUS Live Update vulnerability tracked as CVE-2025-59374 has been making the rounds in infosec feeds, with some headlines implying recent or ongoing exploitation. A closer look, however, shows the ...

Not all CISA KEV listings mean urgent risk. CVE-2025-59374 formalizes the 2019 ASUS ShadowHammer supply-chain attack, not a new exploit.

FAQ updates, older guidance, and new context shared by CISA below signal a classification effort, not an active threat.
www.bleepingcomputer.com/news/securit...

22.12.2025 11:26 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Rip Off Britain - Series 17: 30. Fake Michael Jackson brought bailiffs to my door A man whose home address is hijacked by a fraudster using the name Michael Jackson receives traffic fines and a visit from a bailiff but says the authorities wonโ€™t help.

Even if a flight reservation looks valid, it might only be a hold, not a ticket. If you see just a PNR or reservation number (but no e-/ticket number), call up the airline to confirm before paying!

โฉ Watch on BBC iPlayer: www.bbc.co.uk/iplayer/epis...

28.11.2025 12:28 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
How Your Real Flight Reservation Can Be Used to Scam You Scammers use a booking technicality, traveler confusion, and promises of dirt-cheap tickets to offer hot deals that are anything but.

With holidays coming up, this scam poses a very real threat. After filming with us, Leslie was thankfully reimbursed in full by her bank, but not all victims may be that lucky.

28.11.2025 12:28 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Video thumbnail

Can't believe but... the "real" flight ticket trick is still claiming victims. ๐ŸŽซโœˆ๏ธ

Scammers sell "tickets" that appear valid on the airline website for days, and then vanish.

I'd written about this exact scam in 2023: www.wired.com/story/plane-...

28.11.2025 12:28 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Rip Off Britain - Series 17: 28. Help! Is my online job a scam? A viewer contacts the team after suspecting the online task work heโ€™s been completing could be a scam.

โ–ถ๏ธ Now available on iPlayer
๐Ÿ“ก Next episode: Friday 10.45am
www.bbc.co.uk/iplayer/epis...

26.11.2025 13:21 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0