LiteLLM Supply-Chain Attack: How Trojanized PyPI Packages Turned an AI Gateway Into a Data Exfiltration Tool

Trojanized LiteLLM releases on PyPI enabled data exfiltration with Kubernetes persistence—here’s the full attack chain and how to check if you’re affected.

Read More
Axios npm Package Compromised: Supply Chain Attack via Phantom Dependency Drops Cross-Platform RAT

Axios npm package compromised—attackers hijacked the maintainer’s account and injected a phantom dependency that dropped a cross-platform RAT. Here’s the full attack chain.

Read More
OpenAI Patches ChatGPT DNS Data Exfiltration Flaw and Codex Command Injection Vulnerability

Check Point found ChatGPT’s code sandbox could leak data via DNS. Separately, Codex’s branch name field allowed command injection to steal GitHub tokens.

Read More
Russian CTRL Toolkit: How Malicious LNK Files Enable RDP Hijacking via Reverse Tunnels

A custom .NET RAT dubbed CTRL uses weaponized Windows shortcuts to hijack RDP sessions via FRP tunnels—here’s the full attack chain and how to defend against it.

Read More
Red Menshen’s Upgraded BPFdoor: How China’s Stealthiest Backdoor Infiltrates Global Telecom Networks

Red Menshen’s upgraded BPFdoor backdoor embeds kernel-level sleeper cells in telecom networks worldwide. Here’s how it works and how to detect it.

Read More
Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government

Uncover the decade‑long MSS‑backed campaign targeting Southeast Asian critical infrastructure—USBFect, Bronze Mohawk, and more.

Read More
CRITICAL: Telegram Vulnerability “ZDI‑CAN‑30207” Exposes Users to Zero‑Click Attacks

Telegram zero‑click RCE flaw (ZDI‑CAN‑30207) exposes users to full system compromise—update now or disable media auto‑download.

Read More
Handala Hack: Unveiling the Modus Operandi of a State‑Backed Wiper

Handala Hack exposes how Iranian actors leveraged Intune admin rights and Telegram C2 to wipe 200k systems—here’s the technical deep dive.

Read More
Critical 9.4 CVSS RCE Flaws in n8n Turn Workflows into Backdoors

Critical n8n RCE vulnerabilities expose workflows to backdoors—patch now.

Read More
ClickFix Campaigns Targeting Windows and macOS: A Deep Technical Analysis

Discover how attackers use Windows Terminal to deploy Lumma Stealer via ClickFix – a deep dive into the latest file‑less, LOLBin attack chain.

Read More

Page 1 of 2 • Showing 1 to 10 of 16 posts

💬 Ask our AI Assistant Kali