Beep, Beep - I am your friendly #Snakemake release announcement bot.

There is a new release of the ๐’๐ง๐š๐ค๐ž๐ฆ๐š๐ค๐ž ๐„๐ฑ๐ž๐œ๐ฎ๐ญ๐จ๐ซ ๐๐ฅ๐ฎ๐ ๐ข๐ง ๐Ÿ๐จ๐ซ ๐’๐‹๐”๐‘๐Œ systems. Its version now is 2.6.0!

Give us some time, and you will automatically find the plugin on #Bioconda and #Pypi.

This plugin is relevant for #HPC users using the #SLURM batch system.
The maintainers are here on Mastodon -
@rupdecat and @johanneskoester.

If you discover any issues, please report them on https://github.com/snakemake/snakemake-executor-plugin-slurm/issues.

See https://github.com/snakemake/snakemake-executor-plugin-slurm/releases/tag/v2.6.0 for details. Here is the header of the changelog:
๐‘…๐‘’๐‘™๐‘’๐‘Ž๐‘ ๐‘’ ๐‘๐‘œ๐‘ก๐‘’๐‘  (๐‘๐‘œ๐‘ ๐‘ ๐‘–๐‘๐‘™๐‘ฆ ๐‘Ž๐‘๐‘๐‘Ÿ๐‘–๐‘”๐‘’๐‘‘):
๐…๐ž๐š๐ญ๐ฎ๐ซ๐ž๐ฌ

* job arrays: https://github.com/snakemake/snakemake-executor-plugin-slurm/issues/174
* Set tmpspace with help of gres="tmpspace:10G" syntax: https://github.com/snakemake/snakemake-executor-plugin-slurm/issues/444

๐๐ฎ๐  ๐…๐ข๐ฑ๐ž๐ฌ

* logo: https://github.com/snakemake/snakemake-executor-plugin-slurm/issues/439

๐ƒ๐จ๐œ๐ฎ๐ฆ๐ž๐ง๐ญ๐š๐ญ๐ข๐จ๐ง

* add admin documentation: https://github.com/snakemake/snakemake-executor-plugin-slurm/issues/436

BEEP, BEEP - I am your friendly #Snakemake release announcement bot.

There is a new release of Snakemake. Its version now is 9.18.2!

Give us some time, and you will automatically find it on #Bioconda and #Pypi.

The maintainer is here on Mastodon -
@johanneskoester .

If you discover any issues, please report them on https://github.com/snakemake/snakemake/issues.

See https://github.com/snakemake/snakemake/releases/tag/v9.18.2 for details. Here is the header of the changelog:
๐‘…๐‘’๐‘™๐‘’๐‘Ž๐‘ ๐‘’ ๐‘๐‘œ๐‘ก๐‘’๐‘  (๐‘๐‘œ๐‘ ๐‘ ๐‘–๐‘๐‘™๐‘ฆ ๐‘Ž๐‘๐‘๐‘Ÿ๐‘–๐‘”๐‘’๐‘‘):
๐๐ฎ๐  ๐…๐ข๐ฑ๐ž๐ฌ

* remove debug code ([ac5ad20](https://github.com/snakemake/snakemake/commit/ac5ad209e00aeca2d38e5e5d6ac7f930d2c6a93e))

Popular LiteLLM PyPI package compromised in TeamPCP supply chain attack

The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package on PyPI and claiming to have stolen data from hundreds of thousands of devices during the attack.

BleepingComputer

litellm supply chain compromise (95M+ downloads) tied to TeamPCP.
โ€ข Import-time + .pth execution
โ€ข Full credential harvesting
โ€ข K8s lateral movement
โ€ข Persistent systemd backdoor
Security tools are now prime targets.
Are defenses keeping up?
Source: https://www.endorlabs.com/learn/teampcp-isnt-done
Follow TechNadu for more.

#Infosec #SupplyChainSecurity #PyPI #ThreatIntel

Malicious PyPI Package - LiteLLM Supply Chain Compromise

Pulse ID: 69c460f229588f3179126c1d
Pulse Link: https://otx.alienvault.com/pulse/69c460f229588f3179126c1d
Pulse Author: Tr1sa111
Created: 2026-03-25 22:25:54

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #OTX #OpenThreatExchange #PyPI #SupplyChain #bot #Tr1sa111

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Malicious PyPI Package - LiteLLM Supply Chain Compromise

Pulse ID: 69c46104e1660babf17e92f8
Pulse Link: https://otx.alienvault.com/pulse/69c46104e1660babf17e92f8
Pulse Author: Tr1sa111
Created: 2026-03-25 22:26:12

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #OTX #OpenThreatExchange #PyPI #SupplyChain #bot #Tr1sa111

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
TurboQuant: Redefining AI efficiency with extreme compression

Malicious PyPI Package - LiteLLM Supply Chain Compromise

A malicious supply chain attack has been discovered in the Python Package Index package litellm version 1.82.8. The compromised package contains a malicious .pth file that executes automatically when the Python interpreter starts, without requiring explicit import. This file, located in site-packages/, exfiltrates sensitive information including environment variables, SSH keys, and cloud credentials to an attacker-controlled server. The payload is double base64-encoded to evade basic static analysis. PyPI administrators have quarantined the project to limit its spread. Users are advised to check for the malicious file, rotate all potentially exposed credentials, and audit their PyPI publishing process. The attack is attributed to TeamPCP and is actively exploited in the wild.

Pulse ID: 69c3bb2520934c9e0b4e5dca
Pulse Link: https://otx.alienvault.com/pulse/69c3bb2520934c9e0b4e5dca
Pulse Author: AlienVault
Created: 2026-03-25 10:38:29

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Cloud #CyberSecurity #InfoSec #OTX #OpenThreatExchange #PyPI #Python #RAT #SSH #SupplyChain #Troll #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Supply Chain Attack: Malicious PyPI Packages

TeamPCP has launched a supply chain attack targeting LiteLLM, an open-source Python library used in 36% of cloud environments. Malicious versions 1.82.7 and 1.82.8 were published on PyPI, employing sophisticated techniques for payload delivery and persistence. The compromised packages exploit Python's .pth mechanism for stealthy execution across any Python process. The malware collects sensitive data including API keys, cloud credentials, and CI/CD secrets, encrypting and exfiltrating them to attacker-controlled domains. This attack follows TeamPCP's previous compromises of Aqua Security's Trivy and Checkmarx tools, highlighting an ongoing campaign against the open-source ecosystem. The incident underscores the potential for widespread impact and the need for vigilance in software supply chain security.

Pulse ID: 69c3bb29c62248c6ffd0b50c
Pulse Link: https://otx.alienvault.com/pulse/69c3bb29c62248c6ffd0b50c
Pulse Author: AlienVault
Created: 2026-03-25 10:38:33

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Cloud #CyberSecurity #InfoSec #Malware #OTX #OpenThreatExchange #PyPI #Python #RAT #RCE #SupplyChain #Troll #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

BEEP, BEEP - I am your friendly #Snakemake release announcement bot.

There is a new release of Snakemake. Its version now is 9.18.1!

Give us some time, and you will automatically find it on #Bioconda and #Pypi.

The maintainer is here on Mastodon -
@johanneskoester .

If you discover any issues, please report them on https://github.com/snakemake/snakemake/issues.

See https://github.com/snakemake/snakemake/releases/tag/v9.18.1 for details. Here is the header of the changelog:
๐‘…๐‘’๐‘™๐‘’๐‘Ž๐‘ ๐‘’ ๐‘๐‘œ๐‘ก๐‘’๐‘  (๐‘๐‘œ๐‘ ๐‘ ๐‘–๐‘๐‘™๐‘ฆ ๐‘Ž๐‘๐‘๐‘Ÿ๐‘–๐‘”๐‘’๐‘‘):
๐๐ฎ๐  ๐…๐ข๐ฑ๐ž๐ฌ

* add pip dependency to publish task ([ea2b5c9](https://github.com/snakemake/snakemake/commit/ea2b5c9708792c9261ded758cc859ce8e18e956b))