This is a special SEEK Bytes drop – outside the regular Season 3 line-up – because the recent Axios NPM hack is too important to ignore. In this episode of SEEK Bytes the crew sit down with Eldar Marcussen from SEEK’s offensive security team to unpack what actually happened, why supply-chain attacks are so scary, and what you should do today to reduce your risk.
In this episode you’ll learn:
• What a supply-chain attack really is – how a single malicious dependency in a trusted package like Axios can silently run on thousands of machines, and why closed-source software isn’t magically safer.
• What to do if you think you’ve been hit – practical first moves for companies and individuals: rotating keys, rebuilding or containerising machines, reviewing logs, and knowing when to call in your security team.
• How to raise the bar for attackers – simple habits like pinning and ageing dependencies, using tools like Docker and alternative package managers, relying on built-in protection like Windows Defender, and staying alert to sketchy extensions and “too good to be true” downloads.
🔔 Follow so you don’t miss future special drops like this – plus our regular Season 3 episodes every week.