Malicious telnyx 4.87.1/4.87.2 on PyPI used audio steganography March 27, 2026, enabling cross-platform credential theft.
Supply chain attacks feel like they're becoming more and more common.
Before smartphones, before transistors, before written language, the Inca were running an information system. Scientists just proved their knotted cords can power spreadsheets, encryption, and file ...
The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package ...
Scientists used the quipu’s data to build working spreadsheets, file systems, and encryption tools, rivaling conventional ...
Malicious LiteLLM 1.82.7–1.82.8 via Trivy compromise deploys backdoor and steals credentials, enabling Kubernetes-wide ...
The compromised packages, linked to the Trivy breach, executed a three‑stage payload targeting AWS, GCP, Azure, Kubernetes ...
A phishing campaign targeting healthcare, government, hospitality, and education sectors uses several evasion techniques to ...
Threat actors abused trusted Trivy distribution channels to inject credential‑stealing malware into CI/CD pipelines worldwide ...
Open Wallet Standard launches with 21 firms enabling secure local key storage and multi chain signing for AI agents.
Learn how to detect compromise, assess your exposure to the LiteLLM supply chain attack, and use GitGuardian to orchestrate ...
The Trivy story is moving quickly, and the latest reporting makes one thing clear: this is no longer just a GitHub Actions ...