From misconfigurations to crypto-miners - how vulnerable “test” and “demo” environments turned into an entry point to leading security vendors’ cloud infrastructure and fortune 500 companies.
Misconfigured Argo Workflows may result in a massive supply chain attack
Multiple vulnerabilities affecting the CocoaPods ecosystem, have been discovered, posing a major risk of supply chain attacks.