<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[&quot;As a result of that access, the attackers were able to interact with Checkmarx’s GitHub environment and subsequently publish malicious code to certain artifacts,&quot; the company explains.]]></title><description><![CDATA[<p>"As a result of that access, the attackers were able to interact with Checkmarx’s GitHub environment and subsequently publish malicious code to certain artifacts," the company explains.</p><p>On April 22, as a result of their renewed access or month-long persistence, the attacker published malicious Docker images, VSCode and Open VSX extensions for Checkmarx’s KICS security scanner, which stole credentials, keys, tokens, and config files."</p><p>oh dear</p><p><a href="https://www.bleepingcomputer.com/news/security/checkmarx-confirms-lapsus-hackers-leaked-its-stolen-github-data/" rel="nofollow noopener"><span>https://www.</span><span>bleepingcomputer.com/news/secu</span><span>rity/checkmarx-confirms-lapsus-hackers-leaked-its-stolen-github-data/</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/ef4edfa1-cbc6-4f56-a727-23c66eccb82a/as-a-result-of-that-access-the-attackers-were-able-to-interact-with-checkmarx-s-github-environment-and-subsequently-publish-malicious-code-to-certain-artifacts-the-company-explains.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 01:51:06 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/ef4edfa1-cbc6-4f56-a727-23c66eccb82a.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 28 Apr 2026 15:03:18 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to &quot;As a result of that access, the attackers were able to interact with Checkmarx’s GitHub environment and subsequently publish malicious code to certain artifacts,&quot; the company explains. on Tue, 28 Apr 2026 20:11:22 GMT]]></title><description><![CDATA[<p><span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> Belarus, good luck…</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.nl/users/mkoek/statuses/116484150557745945</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.nl/users/mkoek/statuses/116484150557745945</guid><dc:creator><![CDATA[mkoek@mastodon.nl]]></dc:creator><pubDate>Tue, 28 Apr 2026 20:11:22 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;As a result of that access, the attackers were able to interact with Checkmarx’s GitHub environment and subsequently publish malicious code to certain artifacts,&quot; the company explains. on Tue, 28 Apr 2026 18:52:02 GMT]]></title><description><![CDATA[<p><span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> onion headline:  the company would like the press to make note of. They are a SECURITY company and NOT a repo security company. <img class="not-responsive emoji" src="https://media.infosec.exchange/infosec.exchange/custom_emojis/images/000/029/047/original/c722ec7f805ca24f.png" title=":ablobcool:" /></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/rtificial/statuses/116483838583250965</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/rtificial/statuses/116483838583250965</guid><dc:creator><![CDATA[rtificial@infosec.exchange]]></dc:creator><pubDate>Tue, 28 Apr 2026 18:52:02 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;As a result of that access, the attackers were able to interact with Checkmarx’s GitHub environment and subsequently publish malicious code to certain artifacts,&quot; the company explains. on Tue, 28 Apr 2026 18:24:24 GMT]]></title><description><![CDATA[<p><span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> I'm glad I disabled KICS at our company after the initial Trivy breach. Had a hunch this would happen.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/thepwnicorn/statuses/116483729961744654</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/thepwnicorn/statuses/116483729961744654</guid><dc:creator><![CDATA[thepwnicorn@infosec.exchange]]></dc:creator><pubDate>Tue, 28 Apr 2026 18:24:24 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;As a result of that access, the attackers were able to interact with Checkmarx’s GitHub environment and subsequently publish malicious code to certain artifacts,&quot; the company explains. on Tue, 28 Apr 2026 16:02:46 GMT]]></title><description><![CDATA[<p><span><a href="/user/gossithedog%40cyberplace.social">@<span>GossiTheDog</span></a></span> im begining to think i should never download anything again</p>]]></description><link>https://board.circlewithadot.net/post/https://mas.to/users/aliengasmask/statuses/116483173039937673</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mas.to/users/aliengasmask/statuses/116483173039937673</guid><dc:creator><![CDATA[aliengasmask@mas.to]]></dc:creator><pubDate>Tue, 28 Apr 2026 16:02:46 GMT</pubDate></item><item><title><![CDATA[Reply to &quot;As a result of that access, the attackers were able to interact with Checkmarx’s GitHub environment and subsequently publish malicious code to certain artifacts,&quot; the company explains. on Tue, 28 Apr 2026 15:06:32 GMT]]></title><description><![CDATA[<p>The 'new' lapsus$ portal is <a href="https://lapsus.by" rel="nofollow noopener"><span>https://</span><span>lapsus.by</span><span></span></a> - they're operating in clear web.  I've written to the TLD to see if they want to yeet them.</p>]]></description><link>https://board.circlewithadot.net/post/https://cyberplace.social/users/GossiTheDog/statuses/116482951888588169</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://cyberplace.social/users/GossiTheDog/statuses/116482951888588169</guid><dc:creator><![CDATA[gossithedog@cyberplace.social]]></dc:creator><pubDate>Tue, 28 Apr 2026 15:06:32 GMT</pubDate></item></channel></rss>