The compromised packages, linked to the Trivy breach, executed a three‑stage payload targeting AWS, GCP, Azure, Kubernetes ...
Threat actors abused trusted Trivy distribution channels to inject credential‑stealing malware into CI/CD pipelines worldwide ...
Supply chain attacks feel like they're becoming more and more common.
This growth in illicit activity has pushed encryption to the center of debates about national security, law enforcement and ...
The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package ...
On March 19, 2026, a threat actor known as TeamPCP compromised Aqua Security’s Trivy vulnerability scanner – the most widely adopted open-source scanner in the cloud-native ecosystem. The attacker ...
A growing number of scammers and fraudsters are using artificial intelligence (AI) to quickly gather personal information that they later “weaponize” in targeted scams, Toronto police are warning.
Can 3D printing help address Canada's housing shortage? That's the question researchers, industry leaders and government representatives explored at the University of Windsor on Tuesday with a ...
Active exploits, nation-state campaigns, fresh arrests, and critical CVEs — this week's cybersecurity recap has it all.
File syncing and storage services, also known as cloud storage services, offer major convenience. They let you back up and access your data—documents, photos, video, and other file types—on any ...
Using a VPN, or virtual private network, is one of the best ways to protect your online privacy. We review dozens every year, and these are the top VPNs we've tested. I’ve been writing about ...