Malicious telnyx 4.87.1/4.87.2 on PyPI used audio steganography March 27, 2026, enabling cross-platform credential theft.
The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package ...
Threat actors abused trusted Trivy distribution channels to inject credential‑stealing malware into CI/CD pipelines worldwide ...
The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed ...
It’s a great, easy way to turn your handwriting into a font, but you can use it to create any typeface you can imagine as ...
ThreatsDay Bulletin covers stealthy attack trends, evolving phishing tactics, supply chain risks, and how familiar tools are ...
Crypto investment scams involving hot new AI projects are proliferating, so investors need to be vigilant.
The infostealer uses a first‑seen‑in‑the‑wild debugging method to extract Chrome’s decryption key without privilege ...
Code is not the weakest point in crypto thefts In crypto, security is usually regarded as a technical issue. You are asked to ...
Materials inspired by nature, or biomimetic materials, are nothing new. Scientists have designed water-resistant materials ...