RC RANDOM CHAOS

ci-cd-security

1 post

Article

ShinyHunters exfiltrated Cisco source through Trivy

ShinyHunters exfiltrated Cisco source code through Trivy. The scanner inherited the runtime's identity. The runtime held everything.