Trivy attack force-pushed 75 tags via GitHub Actions, exposing CI/CD secrets, enabling data theft and persistence across developer systems.
If you suspect you were running a compromised version, treat all pipeline secrets as compromised and rotate immediately,’ Trivy maintainer says.
Spread the loveThe cybersecurity landscape has been shaken by a significant supply chain attack involving the popular Trivy vulnerability scanner, a tool widely used in DevOps environments. Developed ...
Open source Trivy plugs into the software build process and scans container images and infrastructure-as-code files for vulnerabilities and misconfigurations. Attacks on cloud-native infrastructures ...
Program’s first members Echo and Minimus deliver secure-by-design image solutions to Trivy users BOSTON and TEL AVIV, Israel, July 07, 2025 (GLOBE NEWSWIRE) -- Aqua Security, the pioneer in cloud ...
(MENAFN- GlobeNewsWire - Nasdaq) New partnership brings agentic AI-powered vulnerability remediation to the Trivy community BOSTON and TEL AVIV, Israel, July 31, 2025 (GLOBE NEWSWIRE) -- Aqua Security ...