Supply chain attacks feel like they're becoming more and more common.
The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package ...
Malicious LiteLLM 1.82.7–1.82.8 via Trivy compromise deploys backdoor and steals credentials, enabling Kubernetes-wide ...
A threat actor who stole credentials from a legitimate node package manager (npm) publisher has spread a persistent, ...
After hacking Trivy, TeamPCP moved to compromise repositories across NPM, Docker Hub, VS Code, and PyPI, stealing over 300GB ...
With almost 175,000 npm projects listing the library as a dependency, the attack had a huge cascade effect and shows how ...
UTC, Aikido Security detected an unusual pattern across the npm registry: dozens of packages from multiple organizations were ...
A cyber attack hit LiteLLM, an open-source library used in many AI systems, carrying malicious code that stole credentials ...
Trivy attack force-pushed 75 tags via GitHub Actions, exposing CI/CD secrets, enabling data theft and persistence across ...
Overview Recently, NSFOCUS Technology CERT detected that the GitHub community disclosed that there was a credential stealing program in the new version of LiteLLM. Analysis confirmed that it had ...
Threat group TeamPCP exploited credentials stolen in the Trivy breach to push malicious versions of LiteLLM to PyPI, exposing ...
If you suspect you were running a compromised version, treat all pipeline secrets as compromised and rotate immediately,’ ...