The TeamPCP hacking group has hacked the Telnyx PyPI package as part of a supply chain campaign targeting the broad OSS ecosystem.
Malicious telnyx 4.87.1/4.87.2 on PyPI used audio steganography March 27, 2026, enabling cross-platform credential theft.
Supply chain attacks feel like they're becoming more and more common.
Gesture control robotics replaces traditional buttons and joysticks with natural hand movements. This approach improves user ...
The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package ...
During a recent penetration test, we came across an AI-powered desktop application that acted as a bridge between Claude ...
Your old laptop is about to outwork that overpriced NAS box ...
JFrog reports Telnyx PyPI package was poisoned with malware by TeamPCP Malicious update delivered hidden .wav payload that ...
DeepLoad exploits ClickFix and WMI persistence to steal credentials, enabling stealth reinfection after three days.
The open-source tool promises hands-free automation, but users may find it costly, complex, and less practical than expected.
After hacking Trivy, TeamPCP moved to compromise repositories across NPM, Docker Hub, VS Code, and PyPI, stealing over 300GB ...
Threats actors pounced on the vulnerability within hours of its disclosure, demonstrating that organizations have little time ...