Quick Facts
- Category: Technology
- Published: 2026-04-30 18:41:04
- How to Make a Lasting Impact in Open Source: Lessons from Seth Nickell
- Everything About New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake ...
- Fintech Product Failures Linked to Feature Overload: Experts Urge Shift to 'Bedrock' Strategy
- Bluetooth Tracker in Postcard Exposes Naval Security Flaw: Dutch Ship Tracked for a Day
- How Meta Escaped the WebRTC Forking Trap – A Dual-Stack Architecture for 50+ Use Cases
The pushed malware scoured infected machines for repository tokens, SSH keys, and other credentials. It has been a bad six weeks for security firm Checkmarx. Over the past 40 days, it has been the victim of at least one supply-chain attack that delivered malware to customers on two separate occasions. Now it has been hit by a ransomware attack from prolific fame-seeking hackers. The streak of misfortunes started on March 19 with the supply-chain attack of Trivy, a widely used vulnerability scanner. The attackers behind the breach first breached the Trivy GitHub account and then used their access to push malware to Trivy users, one of which was Checkmarx.
Both a target and delivery mechanism
Or so Checkmarx thought.Read full article Comments Four days later, Checkmarx’s GitHub account was compromised and began pushing malware to the security firm’s users. The company contained and remediated the breach and replaced the malware with the legitimate apps.