<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Falcon on Ben's Info Tech Blog</title><link>https://infotechwithben.com/tags/falcon/</link><description>Recent content in Falcon on Ben's Info Tech Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 01 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://infotechwithben.com/tags/falcon/index.xml" rel="self" type="application/rss+xml"/><item><title>Axios Supply Chain Attack: CrowdStrike Falcon Mitigation Guide</title><link>https://infotechwithben.com/posts/axios-crowdstrike-falcon-mitigation-guide/</link><pubDate>Wed, 01 Apr 2026 00:00:00 +0000</pubDate><guid>https://infotechwithben.com/posts/axios-crowdstrike-falcon-mitigation-guide/</guid><description>Axios Supply Chain Attack: CrowdStrike Falcon Mitigation Guide Incident Date: March 31, 2026 (00:21–03:29 UTC)
Guide Published: April 1, 2026
Severity: Critical
Platform: CrowdStrike Falcon (All tiers)
For the full incident narrative and non-Falcon detection logic, see the companion article: Axios npm Supply Chain Attack: Incident Analysis &amp;amp; Response Guide
Overview On March 31, 2026, threat actors published two backdoored versions of the axios npm package (1.14.1 and 0.30.4) by compromising maintainer jasonsaayman&amp;rsquo;s npm account.</description></item></channel></rss>