Databricks is looking into a possible security breach that may have happened during the huge TeamPCP software supply chain attack This article explores databricks told. . International Cyber Digest says that Databricks was told about the possible breach last week.

Reports say that the company took the alert seriously and quickly increased the size of its incident response teams to look into the claims. It is still unclear how bad the alleged breach was, and the company has not yet made an official statement about the results. This news comes right after Databrick's recent entry into the cybersecurity field with the release of its AI-powered Lakewatch security platform. In March 2026, the TeamPCC threat group, also known as PCPcat and ShellForce, started a huge supply chain campaign that broke into five major ecosystems: GitHub Actions, Docker Hub, PyPI, NPM, and OpenVSX.

The malware is made to steal environment variables, Kubernetes settings, and cloud tokens from major providers like AWS, Google Cloud, and Microsoft Azure that are exposed during automated build processes. During execution, the payload usually gets the next stages from bad domains using big JavaScript package managers. The stolen secrets are encrypted and sent out as compressed archives.

The bad guys are actively using vendor-specific typosquatting and fallback GitHub repositories.