Sometime in early 2026, a routine vulnerability scan turned into something far worse for machine learning teams that depend ...
Adobe has patched a vulnerability in its flagship document-reading apps, Acrobat DC, Reader DC and Acrobat 2024, that hackers have been actively exploiting for at least four months. The vulnerability, ...
“The moon we are looking at is not the moon you see from Earth whatsoever.” That’s how Artemis II astronaut Christina Koch described our natural satellite as the mission’s spacecraft drew closer to ...
As the Artemis II astronauts hurtled around the moon during their historic flyby, basking in unprecedented views of the illuminated lunar far side, pilot Victor Glover described the visuals as “sci-fi ...
Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with content, and download exclusive resources. Dany Lepage discusses the architectural ...
On March 19, 2026, Trivy, Aqua Security’s widely used open-source vulnerability scanner, was reported to have been compromised in a sophisticated CI/CD-focused supply chain attack. Threat actors ...
The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed credential-stealing malware through official releases and GitHub Actions.
‘If you suspect you were running a compromised version, treat all pipeline secrets as compromised and rotate immediately,’ Trivy maintainer says. Attackers have compromised the widely used open-source ...
The cybersecurity landscape has been shaken by a significant supply chain attack involving the popular Trivy vulnerability scanner, a tool widely used in DevOps environments. Developed by Aqua ...
Hackers have compromised virtually all versions of Aqua Security’s widely used Trivy vulnerability scanner in an ongoing supply chain attack that could have wide-ranging consequences for developers ...
Trivy, a popular open-source vulnerability scanner maintained by Aqua Security, was compromised a second time within the span of a month to deliver malware capable of stealing sensitive CI/CD secrets.
State and local government IT teams face a constant flood of vulnerability alerts. With tens of thousands of new common vulnerabilities and exposures (CVEs) published every year, security teams must ...