Mend.io Blog

Teampcp supply chain attack part 2: litellm pypi credential stealer

TeamPCP Supply Chain Attack Part 2: LiteLLM PyPI Credential Stealer

LATEST
Learn more

Filter & Search

Teampcp supply chain attack part 2: litellm pypi credential stealer - blog cover team pcp attack v2

TeamPCP Supply Chain Attack Part 2: LiteLLM PyPI Credential Stealer

Check and fix your install for the new LiteLLM PyPI compromise.

Read More Read More
Teampcp supply chain attack part 2: litellm pypi credential stealer - blog cover canisterworm

CanisterWorm: The Self-Spreading npm Attack That Uses a Decentralized Server to Stay Alive

Deep dive into the self-spreading CanisterWorm.

Read More Read More
Teampcp supply chain attack part 2: litellm pypi credential stealer - cursor incident

Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident

Cursor’s Composer 2 identified as Moonshot’s Kimi K2.5 exposing an AI governance gap.

Read More Read More
Teampcp supply chain attack part 2: litellm pypi credential stealer - blog mend partnership expansion 1000x650

Mend.io Expands Its Global Infrastructure with a Dedicated Cloud Region in India

Local cloud infrastructure in India for data residency requirements.

Read More Read More
Teampcp supply chain attack part 2: litellm pypi credential stealer - blog ai driven project classification

Introducing AI-powered Contextual Project Classification: From severity scores to business risk

Find your most sensitive code and prioritize fixes.

Read More Read More
Teampcp supply chain attack part 2: litellm pypi credential stealer - system prompt weakness detection blog post

Introducing System Prompt Hardening: production-ready protection for system prompts

Secure your AI applications with system prompt hardening.

Read More Read More
Teampcp supply chain attack part 2: litellm pypi credential stealer - blog ai compliance

AI Compliance: 5 Key Frameworks, Challenges, and Best Practices

Discover how to manage bias, privacy, and shadow AI risks.

Read More Read More
Teampcp supply chain attack part 2: litellm pypi credential stealer - blog ai risk management

AI Risk Management: Process, Frameworks, and 5 Mitigation Methods

Learn how to identify, assess, and mitigate AI risks.

Read More Read More
Teampcp supply chain attack part 2: litellm pypi credential stealer - blog claude code security

Why Claude Code Security Is a Big Moment for Application Security

Discover why enterprise scale requires more than just AI code review - it requires governance.

Read More Read More
Teampcp supply chain attack part 2: litellm pypi credential stealer - blog best software composition analysis providers

Best Software Composition Analysis Providers: Top 5 in 2026

Explore key features of leading SCA providers.

Read More Read More
Teampcp supply chain attack part 2: litellm pypi credential stealer - blog image agent configuration scanning

Securing the New Control Plane: Introducing Static Scanning for AI Agent Configurations

Announcing the launch of AI Agent Configuration Scanning.

Read More Read More
Teampcp supply chain attack part 2: litellm pypi credential stealer - blog ai security testing

AI Security Testing: Threats, Approaches, and Defenses in 2026

Explore AI security testing methods.

Read More Read More
Teampcp supply chain attack part 2: litellm pypi credential stealer - blog cover open source security with ai

You can’t rely on open source for security — not even when AI is involved

Learn how to manage OSS risk and build remediation that actually lands.

Read More Read More
Teampcp supply chain attack part 2: litellm pypi credential stealer - blog top 10 open source vulnerabilities

Top Open Source Vulnerabilities In 2026

Discover the top open source vulnerabilities in 2026.

Read More Read More
Teampcp supply chain attack part 2: litellm pypi credential stealer - blog blackduck sast

Understanding Black Duck SAST: Pros/Cons and Technical Architecture

A detailed review of Black Duck SAST plus a Mend SAST alternative.

Read More Read More
Teampcp supply chain attack part 2: litellm pypi credential stealer - blog cover ai security maturity checklist

Introducing Mend.io’s AI Security Maturity Survey + Compliance Checklist available today

A new tool to help security teams quantify AI risk and prepare for 2026 regulations.

Read More Read More

Subscribe to our Blog

Never miss a post. Opt-out at any time.

Thank you

You’re all set to receive our latest posts.

AI Security & Compliance Assessment

Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.