{"id":7859,"date":"2026-04-22T19:11:57","date_gmt":"2026-04-22T19:11:57","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/04\/22\/malicious-kics-docker-images-and-vs-code-extensions-hit-checkmarx-supply-chain\/"},"modified":"2026-04-22T19:11:57","modified_gmt":"2026-04-22T19:11:57","slug":"malicious-kics-docker-images-and-vs-code-extensions-hit-checkmarx-supply-chain","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/04\/22\/malicious-kics-docker-images-and-vs-code-extensions-hit-checkmarx-supply-chain\/","title":{"rendered":"Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain"},"content":{"rendered":"<p>\u200bCybersecurity researchers have warned of malicious images pushed to the official &#8220;checkmarx\/kics&#8221; Docker Hub repository.<br \/>\nIn an alert published today, software supply chain security company Socket revealed that unknown threat actors managed to have overwritten existing tags, including v2.1.20 and alpine, while also introducing a new v2.1.21 tag that does not correspond to an official release. The\u00a0Cybersecurity researchers have warned of malicious images pushed to the official &#8220;checkmarx\/kics&#8221; Docker Hub repository.<br \/>\nIn an alert published today, software supply chain security company Socket revealed that unknown threat actors managed to have overwritten existing tags, including v2.1.20 and alpine, while also introducing a new v2.1.21 tag that does not correspond to an official release. The\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bCybersecurity researchers have warned of malicious images pushed to the official &#8220;checkmarx\/kics&#8221; Docker Hub repository. In an alert published today, software supply chain security company Socket revealed that unknown threat actors managed to have overwritten existing tags, including v2.1.20 and alpine, while also introducing a new v2.1.21 tag that does not correspond to an official&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/04\/22\/malicious-kics-docker-images-and-vs-code-extensions-hit-checkmarx-supply-chain\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":7860,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/7859"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=7859"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/7859\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/7860"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=7859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=7859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=7859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}