Security researchers disclosed that versions v1.4.1, v1.4.2, and v1.4.3 of Microsoft's official Python client for the Durable Task workflow execution framework were compromised with a credential-stealing worm by the TeamPCP threat group. This incident underscores the ongoing supply chain risks developers face and highlights the need for stringent security measures to protect sensitive credentials. Security teams should immediately audit systems for affected versions and related infection markers, rotate all potentially compromised credentials, and block access to identified C2 infrastructure.
Read the full article at Cyber Security News
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.





