The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed ...
Aqua Security’s Trivy vulnerability scanner was compromised in a supply chain attack, leading to information-stealing ...
New AI-powered scanner -- who-touched-my-packages -- detects zero-day malicious packages and credential exfiltration in seconds BOSTON, March 26, 2026 /PRNewswire/ -- Point Wild, a leading global ...
If you suspect you were running a compromised version, treat all pipeline secrets as compromised and rotate immediately,’ ...
Hackers have compromised virtually all versions of Aqua Security’s widely used Trivy vulnerability scanner in an ongoing ...
The Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are actively exploiting a critical ...
A critical Langflow vulnerability leading to unauthenticated remote code execution has been exploited hours after public ...
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer.
Two versions of LiteLLM, an open source interface for accessing multiple large language models, have been removed from the ...
During a recent penetration test, we came across an AI-powered desktop application that acted as a bridge between Claude ...
Russia, Iran, Israel, Ukraine, and the US have all exploited IP-connected cameras to 'see' monitor adversaries, and private ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results