Aqua Security’s Trivy vulnerability scanner was compromised in a supply chain attack, leading to information-stealing ...
Hackers have compromised virtually all versions of Aqua Security’s widely used Trivy vulnerability scanner in an ongoing ...
Trivy attack force-pushed 75 tags via GitHub Actions, exposing CI/CD secrets, enabling data theft and persistence across ...
The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed ...
Aqua Security is scrambling to recover from supply chain attacks that first compromised the vendor's Trivy vulnerability ...
Spektion, the pioneer in Runtime Exposure Management, announced today at the RSAC™ 2026 Conference the general availability of its expanded platform for Continuous Runtime Exposure Management, ...
Codex Security, formerly Aardvark⁠, has found hundreds of critical vulnerabilities in tested software in the past month.
If you suspect you were running a compromised version, treat all pipeline secrets as compromised and rotate immediately,’ ...
An industry effort to integrate Web application firewalls (WAFs) with vulnerability scanning tools never got off the ground when it was first launched five years ago, but today the idea of blending ...
In vulnerability assessment scanning, preparation and planning can make the difference between an accurate and illuminating scan and a big IT headache. Failure to account for and accommodate legacy ...
eSpeaks’ Corey Noles talks with Rob Israch, President of Tipalti, about what it means to lead with Global-First Finance and how companies can build scalable, compliant operations in an increasingly ...
A critical vulnerability was recently discovered in Imunify360 AV, a security scanner used by web hosting companies to protect over 56 million websites. An advisory by cybersecurity company Patchstack ...