Search

    Language Settings
    Select Website Language

    TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

    2 hours ago

    TeamPCP, the threat actor behind the supply chain attack targeting Trivy, KICS, and litellm, has now compromised the telnyx Python package by pushing two malicious versions to steal sensitive data. The two versions, 4.87.1 and 4.87.2, published to the Python Package Index (PyPI) repository on March 27, 2026, concealed their credential harvesting capabilities within a .WAV file. Users are
    Click here to Read More
    Previous Article
    Iran Moves to Formalize Toll Plan in Strait of Hormuz
    Next Article
    'Harassed By Wife, In-Laws': Pune Man, 20, Poisons Himself, Records Video

    Related Technology Updates:

    Are you sure? You want to delete this comment..! Remove Cancel

    Comments (0)

      Leave a comment