TeamPCP, the group linked to the Trivy supply-chain compromise, has struck again by poisoning the Telnyx Python SDK on PyPI with a multi-stage infostealer. Versions 4.87.1 and 4.87.2 are malicious — the malware downloads a disguised .wav file that executes credential-stealing code. Telnyx has removed the malicious packages, but

6m read timeFrom go.theregister.com
Post cover image
Table of contents
Snapchat, porn platforms, put on notice for DSA violationsLAPSUS$ spills alleged AstraZeneca dataUS National Lab creates exascale AI model vulnerability detector

Sort: