This is a special SEEK Bytes drop – outside the regular Season 3 line-up – because the recent Axios NPM hack is too important to ignore. In this episode of SEEK Bytes the crew sit down with Eldar Marcussen from SEEK’s offensive security team to unpack what actually happened, why supply-chain attacks are so scary, and what you should do today to reduce your risk. In this episode you’ll learn: • What a supply-chain attack really is – how a single malicious dependency in a trusted package like Axios can silently run on thousands of machines, and why closed-source software isn’t magically safer. • What to do if you think you’ve been hit – practical first moves for companies and individuals: rotating keys, rebuilding or containerising machines, reviewing logs, and knowing when to call in your security team. • How to raise the bar for attackers – simple habits like pinning and ageing dependencies, using tools like Docker and alternative package managers, relying on built-in protection like Windows Defender, and staying alert to sketchy extensions and “too good to be true” downloads. 🔔 Follow so you don’t miss future special drops like this – plus our regular Season 3 episodes every week.
AI Summary coming soon
Sign up to get notified when the full AI-powered summary is ready.
Free forever for up to 3 podcasts. No credit card required.
Inside SEEK’s Legendary Hackathons (with Glenn Wilson, Kat Vassallo & Andy Maxey)
Human vs AI: The Sleep-Deprived Dev Who Beat OpenAI’s Code Bot
SEEK Bytes returns on April 22 for Season 3
From Engineer to EM: Imposter Syndrome, Mentors & more (with Gladys Lim)
Free AI-powered recaps of SEEK Bytes and your other favorite podcasts, delivered to your inbox.
Free forever for up to 3 podcasts. No credit card required.