/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Sources: threat actors stole Cisco source code by breaching its internal development environment using credentials from a recent Trivy supply chain attack

Cisco has suffered a cyberattack after threat actors used stolen credentials from the recent Trivy supply chain attack to breach …

BleepingComputer Lawrence Abrams

Discussion

  • @lukolejnik Lukasz Olejnik on x
    Now all you have to do is to run a LLM on this dataset chest. Here's the prompt: “There are 5 security bugs, find them, make no mistakes”. https://www.bleepingcomputer.com/ ... [image]
  • @mattjay Matt Johansen on x
    Cisco source code leaked due to supply chain attacks from the past few weeks. Namely the Trivy hack - same that caused the LiteLLM compromise. As with the others, all lead back to GitHub Actions to steal creds - via BleepingComputer [image]
  • @gbrl_dick Gabriel on x
    haha guys is this bad
  • @dystopiabreaker @dystopiabreaker on x
    it's not clear to me how current AI systems would significantly accelerate supply chain attacks. the “fire alarm” i have been looking for is a cavalcade of 0day and unexplained breaches; worming through supply chains is loud and mostly the compromise happens by social engineering
  • @daniellefong Danielle Fong on x
    CYBERSECURITY APOCALYPSE TIME