Addressing the #LiteLLM supply chain incident:

All #SakuraSky managed production environments are unaffected by the v1.82.7/8 compromise.

Our infrastructure is a "Zero-Value Target." Using #OIDC and Just-in-Time key injection, we ensure that even if a library is breached, it finds an "empty room"- no static keys or .env files to steal.

We’re also accelerating our Sentinel framework for deeper AI agent governance.

Details: https://www.sakurasky.com/blog/security-advisory-litellm/

#InfoSec #AI #SupplyChainSecurity #DevSecOps

HackerOne breach (via Navia):
• BOLA exploited
• Employee PII exposed
• High phishing risk
Third-party risk remains critical.

Source: https://www.bleepingcomputer.com/news/security/hackerone-discloses-employee-data-breach-after-navia-hack/

How are you mitigating it?
Follow @technadu

#InfoSec #DataBreach #SupplyChainSecurity

경고: Trivy 공격보다 심각 — GitHub 상위 50K 인기 레포를 스캔한 결과 20,265개가 유사 취약점에 노출. CI/CD 취약점 192,776건, 5.9억+ 하위 포크 영향, 별 50K 이상 레포의 68%가 취약. tj-actions는 PoC, Trivy는 확산. Vigilant Defense가 액션·glassworm 벡터를 찾는 오픈소스 스캐너 Runner Guard 공개(설치: brew). 즉시 스캔·수정 권고. (이미지 포함)

https://x.com/vigilance_one/status/2036581210663616729

#cicdsecurity #supplychainsecurity #devsecops #githubactions #opensource

Chris Nyhuis (@vigilance_one) on X

ALERT: If you thought the Trivy attack was bad, 20,265 repos on GitHub have similar vulnerabilities. We scanned the top 50K most-starred repos. 192,776 CI/CD findings. 590M+ downstream forks exposed. The most popular repos are the most vulnerable, 68% vuln rate at 50K+ stars.

X (formerly Twitter)

Not all SBOMs are created equal. 🧠 Anchore 5.25 turns your 3rd-party SBOMs into context-rich security assets. A new "Type" attribute gives you immediate clarity on the codebase element being analyzed (Container, Firmware, Device, etc).

https://anchore.com/blog/anchore-enterprise-5-25/

#SupplyChainSecurity

Generating an SBOM is the easy part.

Marc Herren leads a hands-on workshop at DevOpsDays Zürich 2026 on professional SBOM management and risk mitigation. Work with OWASP Dependency-Track and VEX to turn static SBOMs into a living security ecosystem.

The EU Cyber Resilience Act demands more than a scan. Learn how to deliver it.

https://www.devopsdays.ch/event/program/workshops/marc-herren/

#DevOpsDays #DevOps #SBOM #SupplyChainSecurity

🔥 Oh no, the Trivy ecosystem supply chain was *briefly* compromised! 😱 But don't worry, the GitHub wizards are on it with their magical AI tools and buzzword-laden solutions! 🚀 Who needs real security when you have AI-generated code and instant dev environments, am I right? 😂
https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23 #TrivyCompromise #GitHubAI #SupplyChainSecurity #DevOpsHumor #Cybersecurity #HackerNews #ngated
Trivy ecosystem supply chain briefly compromised

## Summary On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credent...

GitHub
Trivy ecosystem supply chain briefly compromised

## Summary On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credent...

GitHub

Five AI agent security products launched in 48 hours. An agent disabled its own governance in 4 commands. 39 malicious skills delivered macOS malware. An autonomous bot pwned Trivy, Microsoft, DataDog repos.

What each product does and what gaps remain.

https://mistaike.ai/blog/ai-agent-security-market-inflection

#AIAgent #MCPSecurity #InfoSec #CyberSecurity #SupplyChainSecurity

Five AI Agent Security Products Launched in 48 Hours. The Market Is Telling You Something.

Between March 17 and 18, five companies shipped AI agent security products — runtime isolation, supply chain hardening, red teaming, and MCP gateways. The incidents that forced their hand, what each one actually does, and the gaps nobody is filling yet.

mistaike.ai

Five AI agent security products launched in 48 hours. An agent disabled its own governance in 4 commands. 39 malicious skills delivered macOS malware. An autonomous bot pwned Trivy, Microsoft, DataDog repos.

What each product does and what gaps remain.

https://mistaike.ai/blog/ai-agent-security-market-inflection

#AIAgent #MCPSecurity #InfoSec #CyberSecurity #SupplyChainSecurity

Five AI Agent Security Products Launched in 48 Hours. The Market Is Telling You Something.

Between March 17 and 18, five companies shipped AI agent security products — runtime isolation, supply chain hardening, red teaming, and MCP gateways. The incidents that forced their hand, what each one actually does, and the gaps nobody is filling yet.

mistaike.ai

New reference guide: What Is the AI Bill of Materials (AIBOM)?

Models can be silently updated. Training data has no chain of custody. 61% of AI system components have no documented provenance.

Full taxonomy, SBOM vs AIBOM comparison, and 2026 tooling:
https://dev.to/tiamatenity/what-is-the-ai-bill-of-materials-why-aibom-compliance-is-becoming-mandatory-22c7

#infosec #AISecuity #ML #supplychainsecurity