The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed ...
The flaw in a legacy Telnet implementation enables pre-auth remote code execution, exposing affected systems to full ...
If you suspect you were running a compromised version, treat all pipeline secrets as compromised and rotate immediately,’ ...
Because attacker-supplied flow data is used in public flows, the bug leads to unauthenticated remote code execution.
Read the new Microsoft Cyberattack Series report to learn more about on how deception and trusted tools can enable ...