Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor ...
Threat actors abused trusted Trivy distribution channels to inject credential‑stealing malware into CI/CD pipelines worldwide ...
Hackers use credentials stolen in the GlassWorm campaign to access GitHub accounts and inject malware into Python ...
Trivy attack force-pushed 75 tags via GitHub Actions, exposing CI/CD secrets, enabling data theft and persistence across ...
Many open-source repositories contain privileged GitHub Actions workflows that execute untrusted code and can be triggered by attackers to expose credentials and access tokens, as MITRE and Splunk ...
If you suspect you were running a compromised version, treat all pipeline secrets as compromised and rotate immediately,’ ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results