The Lab · 2026-03-25 05:56:49 · GitHub Issues
A critical supply chain attack has compromised the official GitHub Actions for Aqua Security's Trivy vulnerability scanner. A threat actor, using stolen credentials, force-pushed malicious code to 76 out of 77 version tags in the `aquasecurity/trivy-action` repository, replacing legitimate releases with credential-stea...
The Lab · 2026-03-31 10:27:06 · GitHub Issues
A sophisticated supply chain attack has compromised the official GitHub Actions for Trivy, a critical open-source security scanner used by millions of repositories. Threat actors, using stolen credentials, successfully published malicious releases and force-pushed nearly all version tags for the `aquasecurity/trivy-act...
The Lab · 2026-03-31 17:27:27 · GitHub Issues
A sophisticated supply chain attack has compromised the core security tools of Aqua Security's Trivy project, with a threat actor using stolen credentials to publish malicious software releases and overwrite dozens of version tags with credential-stealing malware. The attack targeted the official `aquasecurity/trivy-ac...
The Lab · 2026-03-31 18:27:15 · GitHub Issues
A sophisticated supply chain attack has compromised the core security tools of Aqua Security's Trivy project, with a threat actor using stolen credentials to publish malicious software releases and overwrite nearly all version tags in the official GitHub repositories. The breach directly targeted the `aquasecurity/triv...
The Lab · 2026-04-15 16:22:50 · GitHub Issues
A threat actor has compromised the official GitHub repositories for Aqua Security's Trivy vulnerability scanner, force-pushing malicious code to dozens of version tags. The attack, which began on March 19, 2026, involved the use of stolen credentials to publish a malicious Trivy v0.69.4 release and to overwrite 76 out ...
The Vault · 2026-05-13 03:18:24 · The Register
A growing number of Google Cloud customers are fighting for refunds after discovering their API keys were compromised and exploited to run costly artificial intelligence inference workloads, leaving them responsible for bills totaling tens of thousands of dollars. The exposed keys were allegedly used within minutes to ...