Aggregated IntelIndustry News
Trivy Supply Chain Attack Targets CI/CD Secrets
A threat actor used the open source security tool to deploy an infostealer into CI/CD workflows and steal cloud credentials, SSH keys, tokens, and other sensitive secrets.
Aggregated from Dark Reading
This article was automatically aggregated from an external source. Content may be summarized.
Full Analysis
A threat actor used the open source security tool to deploy an infostealer into CI/CD workflows and steal cloud credentials, SSH keys, tokens, and other sensitive secrets.
Source: Dark Reading
Original Source
Dark Reading