Trivy supply chain attack: Aqua rotated credentials to cut off the attacker. The attacker stayed in using valid logins.
Mandiant: 1,000+ impacted SaaS environments.
Credential rotation is the right response, but not sufficient when the attacker already has valid access that looks legitimate to everything watching.
Behavioral detection during the persistence phase is the other half.
Try us free: gethumming.io
Full article: 👇 https://cyberscoop.com/trivy-supply-chain-attack-aqua-downstream-extortion-fallout/?utm_source=dlvr.it&utm_medium=twitter