Vue lecture

How a Typosquatted Domain and a Fake Version Tag Turned Trivy Into a Credential Stealer

On March 19, 2026, someone (or some group) poisoned the Aqua Security Trivy ecosystem. A tool that thousands of organizations rely on to find vulnerabilities in their container images and configurations was quietly turned into a weapon that stole their secrets instead. I spent some time pulling apart the malicious code and cross-referencing findings from Wiz’s analysis, and figured the walkthrough was worth sharing. Here’s how it happened (and how a majority of the tech industry ignored the compromise because it was a Friday).

The post How a Typosquatted Domain and a Fake Version Tag Turned Trivy Into a Credential Stealer appeared first on Linux Today.

  •  

ClipXDaemon: The Linux Clipboard Hijacker Targeting Cryptocurrency Wallets

Linux users often focus on learning essential tools like the cp command, ls command, firewall configurations such as iptables reject vs drop, or utilities like batcat to improve productivity and system visibility. However, even experienced users sometimes overlook a different layer of security threats: malware specifically designed for Linux environments. One recent example is ClipXDaemon, a clipboard-hijacking malware targeting cryptocurrency transactions in X11 desktop sessions.

The post ClipXDaemon: The Linux Clipboard Hijacker Targeting Cryptocurrency Wallets appeared first on Linux Today.

  •