TeamPCP strikes again, with almost identical code to LiteLLM.
The compromised packages, linked to the Trivy breach, executed a three‑stage payload targeting AWS, GCP, Azure, Kubernetes ...
After hacking Trivy, TeamPCP moved to compromise repositories across NPM, Docker Hub, VS Code, and PyPI, stealing over 300GB ...
Supply chain attacks feel like they're becoming more and more common.
The Python programming language serves as a scripting language suited for quick programming tasks. It's more accessible to small business owners and others who are casual programmers than other ...
Malicious LiteLLM 1.82.7–1.82.8 via Trivy compromise deploys backdoor and steals credentials, enabling Kubernetes-wide ...
TeamPCP is exploring ways to monetize the secrets harvested during supply chain attacks, with identified ties to the Lapsus$ ...
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly to ...
The TeamPCP hacking group has been using credentials stolen in the recent OSS campaign to enumerate and compromise AWS ...
On the morning of March 24, 2026, tens of thousands of software developers working on AI applications were unknowingly exposed to malware.
LangChain and LangGraph have patched three high-severity and critical bugs.
Learn how to detect compromise, assess your exposure to the LiteLLM supply chain attack, and use GitGuardian to orchestrate ...