TeamPCP strikes again, with almost identical code to LiteLLM.
PyPIで公開されているライブラリー「litellm」の特定版に不正コードが混入した。悪用によって認証情報の窃取やK8sへの横展開、永続的なバックドア設置が可能になるという。利用環境の調査および認証情報の更新が強く推奨される。
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly to ...
On the morning of March 24, 2026, tens of thousands of software developers working on AI applications were unknowingly exposed to malware.
LangChain and LangGraph have patched three high-severity and critical bugs.
Learn how to detect compromise, assess your exposure to the LiteLLM supply chain attack, and use GitGuardian to orchestrate ...