Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mini Shai-Hulud Hits AntV: 300+ Malicious npm Packages Published via Compromised Maintainer Account

A supply chain attack affecting the @antv data visualization ecosystem and related npm packages is actively spreading through the npm registry. The attack, attributed to a threat group called TeamPCP and branded as another wave of the Mini Shai-Hulud campaign, published more than 300 malicious package versions across 323 packages in a 22-minute automated burst on May 19, 2026. The packages collectively represent approximately 16 million weekly downloads.

What is an intelligent workflow? The enterprise blueprint for moving past automation

Every team has a workflow that technically works but actually runs through Slack threads, forwarded emails, and "Hey, can you check this?" messages. Security teams see it in alert triage that depends on three analysts knowing which tab to check. IT teams see it in onboarding that breaks every time HR adds a new system. Ops teams see it in access requests that loop through five tools before anyone clicks approve. The work gets done, but it doesn't scale, and it doesn't survive a team change.

How to Integrate ITSM in Aurora Vulnerability Management for Better Visibility & Faster Remediation

See how Arctic Wolf Aurora Vulnerability Management turns risk visibility into remediation through seamless integrations with partners like ServiceNow and ConnectWise. This demo shows how automated ticketing, unified workflows, and prioritized findings help security and IT teams accelerate remediation without added workload.

Is Your Security Built for Today's World?

MSPs are under pressure to deliver stronger security across a growing customer base without adding more tools or people. Despite this, many still rely on approaches that don’t scale, leading to gaps, alert overload, and missed opportunities to grow their security business. The goal of this 30-minute session is to help MSPs take a step back and assess how they’re delivering security today. We’ll walk them through the most common pressure points, help identify where their current approach is falling short, and guide them toward the next conversation based on what matters most to their business.

Shiny Hunters' Supply Chain Playbook: How Tech and Enterprise Get Breached Without Clicking a Single Phishing Link

If you look at the cybersecurity setups of massive companies like Rockstar Games, Medtronic, or Amtrak, they look like digital fortresses. They spend millions on top-tier firewalls, hire elite security teams, and lock down their perimeters. Yet, all of them have made headlines for major data breaches. Recent Data Breaches How does this happen if their security is so good? The answer is simple: Attackers didn’t kick down the front door.

How to Reduce Alert Fatigue in AI Agent Detection: Why It's a Unit-of-Detection Problem, Not a Triage Problem

When AI agent workloads start generating more alerts than your SOC can keep up with, the instinct most teams reach for is to deploy more triage on top of what they already have. If the SIEM is producing thousands of atomized alerts, plug in something downstream that can cluster, prioritize, and auto-resolve them faster than a human can. The market has consolidated around exactly this answer.

Accelerating Cloud Security Outcomes Together: Why Arctic Wolf and Wiz are Redefining What's Possible

Across every industry, one thing has become abundantly clear: Cloud security has never been more critical, nor more complex. Organizations are scaling cloud environments faster than ever, but the explosion of identities, configurations, and services has created an attack surface that traditional approaches simply can’t keep up with. Teams are drowning in alerts, struggling to identify which issues matter, and facing increasing pressure to respond to threats with limited resources.