This issue of The Cybersecurity Pulse summarizes major supply-chain and data-exfiltration incidents—most notably Lapsus$ dumping a 96GB archive from Checkmarx via credentials stolen in the TeamPCP/Trivy compromise—and covers new AI-driven security tooling and vendor developments from Google, Wiz, and Amazon. It also highlights critical vulnerabilities and breaches, including the Copy Fail Linux LPE, ShinyHunters’ claims on Medtronic and Carnival, and insurer data showing misconfigured MFA as a significant loss driver. #Lapsus #Checkmarx
Keypoints
- Lapsus$ published a 96GB archive of Checkmarx data after abusing credentials stolen from the Trivy supply-chain compromise attributed to TeamPCP.
- Google Cloud Next announced new SecOps agents, a Gemini Enterprise Agent Platform with agent identity and governance, and broader Wiz integrations across cloud and agent stacks.
- Researchers disclosed Copy Fail, a Linux local privilege escalation that enables container/tenant breakout via the shared page cache and a public 732-byte PoC.
- ShinyHunters claimed breaches impacting Medtronic and Carnival/Holland America, but vectors remain unclear and disclosures lack full technical detail.
- Insurer Resilience data shows misconfigured MFA accounts for 26% of losses while ransomware generates 90% of total loss from 12% of claims, underscoring gaps in controls and visibility.
Read More: https://www.cybersecuritypulse.net/p/tcp-130-checkmarx-on-dark-web-linux