The Linux-based ELF backdoor is targeting cloud workloads across providers, using SMTP-based C2 and typosquatted Alibaba ...
A single unauthenticated connection gives attackers a full shell; credential theft observed in under three minutes on honeypot servers.
Over 1,700 malicious packages since Jan 2025 fuel cross-ecosystem supply chain attacks, enabling espionage and financial ...
The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package on PyPI and claiming to have stolen data from hundreds of thousands of ...
Nature of This Tool: license-comply is a software tool that applies a rules-based classification system to open-source license metadata. It provides general information about common open-source ...
Binary & hash scanning Trivy executables on the filesystem matching any of the 10 known malicious SHA256 hashes for v0.69.4, or binaries self-reporting that version GitHub Actions run log audit ...