Malicious LiteLLM 1.82.7–1.82.8 via Trivy compromise deploys backdoor and steals credentials, enabling Kubernetes-wide persistence and lateral spread.
The hackers compromised GitHub Action tags, then shifted to NPM, Docker Hub, VS Code, and PyPI, and teamed with Lapsus$.
A threat actor who stole credentials from a legitimate node package manager (npm) publisher has spread a persistent, worm-like malware across dozens of packages, security firms say. Named CanisterWorm ...
The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed ...
The GlassWorm supply-chain campaign has returned with a new, coordinated attack that targeted hundreds of packages, ...
Unlike Nvidia's earlier Grace processors, which were primarily sold as companions to GPUs, Vera is positioned as a ...
GlassWorm campaign injects malware into GitHub Python repos using stolen tokens since March 8, 2026, exposing developers to ...
Hackers use credentials stolen in the GlassWorm campaign to access GitHub accounts and inject malware into Python repositories.
Threat actors are publishing clean extensions that later update to depend on hidden payload packages, bypassing marketplace ...
A reticulated python died after it was run over at least twice while crossing Cecil Road on the evening of Mar. 12, despite ...
A woman drove to station 43 for assistance after her pet escaped.