Topic: malware execution
-
Trivy Scanner Compromised in Major Supply-Chain Attack
A supply-chain attack compromised nearly all versions of the Trivy vulnerability scanner after attackers used stolen credentials to force malicious code into its Git repository. The injected malware harvests sensitive data like GitHub tokens and cloud credentials from development pipelines and ma...
Read More » -
Android Malware Now Uses Gemini AI to Evolve in Real Time
A new Android malware uses Google's Gemini AI to dynamically adapt its behavior in real-time, analyzing device environments and generating code to evade detection. The malware accesses the Gemini API to conduct reconnaissance and tailor malicious actions, though Google states it has not been foun...
Read More »