<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[The cybercrime group TeamPCP compromised the Checkmarx Jenkins AST plugin by exploiting credentials obtained from a previous supply chain attack.]]></title><description><![CDATA[<p>The cybercrime group TeamPCP compromised the Checkmarx Jenkins AST plugin by exploiting credentials obtained from a previous supply chain attack. Checkmarx has since released a patched version of the plugin to address the malicious code and mitigate the security breach.<br /><a href="https://thehackernews.com/2026/05/teampcp-compromises-checkmarx-jenkins.html" rel="nofollow noopener"><span>https://</span><span>thehackernews.com/2026/05/team</span><span>pcp-compromises-checkmarx-jenkins.html</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/32519ac4-6e76-4ce0-9c62-8b1286e16d87/the-cybercrime-group-teampcp-compromised-the-checkmarx-jenkins-ast-plugin-by-exploiting-credentials-obtained-from-a-previous-supply-chain-attack.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 02:36:14 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/32519ac4-6e76-4ce0-9c62-8b1286e16d87.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 14 May 2026 16:40:53 GMT</pubDate><ttl>60</ttl></channel></rss>