{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreic6chk3lbacohzpttwuzm4xw67lbdsaernpf4cy5do4dhvweez2ja",
    "uri": "at://did:plc:xb5etev7ncohgebas3kjeqek/app.bsky.feed.post/3midroojmkd42"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreie5pomzgl5pe7pvrfl76vqiwwkkqumpnajrcqypbq5ct6noilb754"
    },
    "mimeType": "image/jpeg",
    "size": 140640
  },
  "path": "/teampcp-fake-ringtone-file-tainted-telnyx-sdk-credentials/",
  "publishedAt": "2026-03-30T10:50:41.000Z",
  "site": "https://hackread.com",
  "tags": [
    "Security",
    "Cyber Attacks",
    "Cyber Attack",
    "Cybersecurity",
    "Malware",
    "Supply Chain",
    "TeamPCP",
    "Telnyx",
    "Trivy"
  ],
  "textContent": "Telnyx issues an urgent alert after hackers TeamPCP uploaded malicious versions (4.87.1 & 4.87.2) of its Python SDK to steal cloud and crypto credentials.",
  "title": "TeamPCP Uses Fake Ringtone File in Tainted Telnyx SDK to Steal Credentials"
}