Hacker News1 min read
Catching the LiteLLM and Telnyx supply chain zero-
Following the discussions around the LiteLLM compromise and today's terrifying telnyx zero-day, my team and I wrote up a technical breakdown of how the TeamPCP actors are bypassing legacy SCA tools.The tl;dr is that traditional scanners are looking for signatures, while the attackers are weaponizing context. By hiding an executable payload inside mathematically valid .wav audio frames, TeamPCP ensured that content filters and CVE databases waved the Telnyx payload right through.We spent the week
Read original on point-wild.github.io4
0Related
Hacker News
LinkedIn Is Illegally Searching Your Computer
Discussed on Hacker News with 538 points and 254 comments.
538
254Hacker News
Artemis II lifts off: four astronauts begin 10-day
Discussed on Hacker News with 206 points and 101 comments.
206
101Hacker News
How the AI Bubble Bursts
Discussed on Hacker News with 117 points and 76 comments.
117
76Get the 10 best reads every Sunday
Curated by AI, voted by readers. Free forever.
Liked this? Start your own feed.
Comment
Sign in to join the discussion.
Loading comments…