TeamPCP’s latest victim is the Telnyx Python SDK on PyPl, coming after a wave of supply chain hits on Aqua Trivy, Checkmarx KICS/OpenVSX, and LiteLLM.
From decipher.scSearch
Wendy Nather joins Dennis Fisher to dig into the nutrient-rich narrative soil that produced a modern classic that truly epitomizes the hacker ethos. We are the greatest podcasters on Mars!
From decipher.scThe new sanctions list includes two China-based technology companies, two of their co-founders, and an Iranian firm, all implicated in a range of attacks from corporate espionage and critical...
From decipher.scThe new sanctions list includes two China-based technology companies, two of their co-founders, and an Iranian firm, all implicated in a range of attacks from corporate espionage and critical...
From decipher.scThe US and other international partners seized 34 SocksEscort domains and 23 servers in seven countries. The U.S. also froze $3.5 million in cryptocurrency.
From decipher.scThe modern Sednit arsenal is centered on two highly-developed implants, deployed systematically in tandem to ensure persistent access.
From decipher.scThe modern Sednit arsenal is centered on two highly-developed implants, deployed systematically in tandem to ensure persistent access.
From decipher.scThe modern Sednit arsenal is centered on two highly-developed implants, deployed systematically in tandem to ensure persistent access.
From decipher.scOut of 42 unique zero days tracked by Google in 2025, 18 were attributed to CSVs, while 15 were linked to state-sponsored espionage groups.
From decipher.scWithout context, the KEV catalog is just a very large collection of data. Tod Beardsley is the former CISA KEV section chief, and he recently released a paper called KEVology that provides key...
From decipher.scCisco released software updates on Feb. 25 to fix the vulnerability, which affects both on-premises and cloud deployments of the Catalyst SD-WAN Controller.
From decipher.scIn a parallel Tuesday announcement, the Treasury Department also sanctioned the exploit broker network that had acquired the tools.
From decipher.scThis campaign is an offshoot of the more familiar and pervasive fake job interview and phony tech worker scams that have been coming from North Korea for several years.
From decipher.scGoogle said it has found 53 victims that have been impacted by the group, which it has tracked since 2017.
From decipher.scExploitation of CVE-2026-1281 and CVE-2026-1340 is “widespread and mostly automated," according to Unit 42 researchers.
From decipher.sc