Malicious telnyx 4.87.1/4.87.2 on PyPI used audio steganography March 27, 2026, enabling cross-platform credential theft.
The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed ...
After hacking Trivy, TeamPCP moved to compromise repositories across NPM, Docker Hub, VS Code, and PyPI, stealing over 300GB ...
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access ...
Hackers have compromised virtually all versions of Aqua Security’s widely used Trivy vulnerability scanner in an ongoing ...
A threat actor who stole credentials from a legitimate node package manager (npm) publisher has spread a persistent, ...
Malicious LiteLLM 1.82.7–1.82.8 via Trivy compromise deploys backdoor and steals credentials, enabling Kubernetes-wide ...
If you suspect you were running a compromised version, treat all pipeline secrets as compromised and rotate immediately,’ ...
The Raspberry Pi 5 is several times faster than previous models of the compact and cheap computer. For less than a couple hundred bucks, you can have a computer that can do many tasks that previously ...
A critical supply chain attack has compromised the popular JavaScript library axios, leading to developers unknowingly ...
The technicians who designed Lavender, Unit 8200’s AI targeting engine, understand this better than most. They designed a machine that sees what it was trained to see. Give it enough information about ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results