GeistHaus
log in · sign up

Update: Ongoing Investigation and Continued Remediation

aquasec.com

Open Source Security Advisory Update: Wednesday, April 1, 2026 Boston, MA 10:00 AM ET Over the past week, we have nearly finalized our investigation and are now in the final stages of documentation and review. There continues to be no indication that Aqua’s commercial products have been affected. As part of this process, we identified …

16 pages link to this URL
Quarterly Threat Report: First Quarter, 2026

The first quarter of 2026 started with a lull and ended with a bang. Early seasonal slowdowns across ransomware deployments, infostealer downloads, and other observed cybercriminal activity gave way to high-profile announcements, politically linked cyberattacks, and AI developments that shaped the cyber threat landscape this quarter.

AI Supply Chain Security After Mercor

The Mercor breach and the LiteLLM compromise exposed a blind spot in AI security. This deep technical piece explains how to secure AI data vendors, CI/CD paths, release pipelines, and AI gateways with continuous red teaming and evidence-backed validation.

1 inbound link article en Hot topics
Project: bumpflow

Personal notes on systems engineering and IT: guides, deep dives, dissections, and sometimes reflections.

0 inbound links article en CC BY 4.0
npm’s Defaults Are Bad

The npm client’s default settings are a root cause of JavaScript’s recurring supply chain security problems.

0 inbound links article en
Trivy supply chain compromise: What Docker Hub users should know | Docker

On March 19, 2026, threat actors compromised Aqua Security's CI/CD pipeline and used stolen credentials to push backdoored versions of the aquasec/trivy vulnerability scanner to Docker Hub. A second wave of compromised images followed on March 22. The malicious images contained an infostealer targeting CI/CD secrets, cloud credentials, SSH keys, and Docker configurations. This post summarizes what happened, what Docker did in response, and what you should do if you use Trivy.

2 inbound links article en Products
More, and More Extensive, Supply Chain Attacks

Open source components are getting compromised a lot more often. I did some counting, with a combination of searching, memory, and AI assistance, and we had two in 2026-Q1 ( trivy, axios), after four in 2025 ( shai-hulud, glassworm, nx, tj-actions), and very few historically [1]: Earlier attacks were generally compromises of single projects, but some time around Shai-Hulud in 2025-11 there sta

0 inbound links article en airisktech
Every Package You Install Can Read Your Secrets

Why npm, pip, and direct Git dependencies can expose your secrets, how the attack works, and which controls actually reduce the blast radius.

0 inbound links article en application-securitydont get hacked supply chain attacksmalicious packagesdependency securityenv secretsnpm securitypip security