LiteLLM Supply-Chain Attack: How Trojanized PyPI Packages Turned an AI Gateway Into a Data Exfiltration Tool
LiteLLM Supply-Chain Attack: How Trojanized PyPI Packages Turned an AI Gateway Into a Data Exfiltration Tool
AI Security Kubernetes Supply Chain Attack LiteLLM PyPI Data Exfiltration Apr 02, 2026

Trojanized LiteLLM releases on PyPI enabled data exfiltration with Kubernetes persistence—here’s the full attack chain and how to check if you’re affected.

Read full analysis →
Axios npm Package Compromised: Supply Chain Attack via Phantom Dependency Drops Cross-Platform RAT
Axios npm Package Compromised: Supply Chain Attack via Phantom Dependency Drops Cross-Platform RAT
RAT Axios npm Supply Chain Attack Dependency Injection JavaScript Mar 31, 2026

Axios npm package compromised—attackers hijacked the maintainer’s account and injected a phantom dependency that dropped a cross-platform RAT. Here’s the full attack chain.

Read full analysis →
OpenAI Patches ChatGPT DNS Data Exfiltration Flaw and Codex Command Injection Vulnerability
OpenAI Patches ChatGPT DNS Data Exfiltration Flaw and Codex Command Injection Vulnerability
AI Security OpenAI ChatGPT Codex DNS Exfiltration Command Injection Mar 30, 2026

Check Point found ChatGPT’s code sandbox could leak data via DNS. Separately, Codex’s branch name field allowed command injection to steal GitHub tokens.

Read full analysis →
Russian CTRL Toolkit: How Malicious LNK Files Enable RDP Hijacking via Reverse Tunnels
Russian CTRL Toolkit: How Malicious LNK Files Enable RDP Hijacking via Reverse Tunnels
Threat Intelligence CTRL Toolkit LNK Exploitation RDP Hijacking FRP Tunnels Russian APT Mar 30, 2026

A custom .NET RAT dubbed CTRL uses weaponized Windows shortcuts to hijack RDP sessions via FRP tunnels—here’s the full attack chain and how to defend against it.

Read full analysis →
Red Menshen’s Upgraded BPFdoor: How China’s Stealthiest Backdoor Infiltrates Global Telecom Networks
Red Menshen’s Upgraded BPFdoor: How China’s Stealthiest Backdoor Infiltrates Global Telecom Networks
BPFdoor Red Menshen APT Telecom Espionage Linux Kernel Threat Intelligence Mar 29, 2026

Red Menshen’s upgraded BPFdoor backdoor embeds kernel-level sleeper cells in telecom networks worldwide. Here’s how it works and how to detect it.

Read full analysis →
Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government
Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government
Malware RAT MSS Southeast Asia Windows 10 Mar 28, 2026

Uncover the decade‑long MSS‑backed campaign targeting Southeast Asian critical infrastructure—USBFect, Bronze Mohawk, and more.

Read full analysis →

Page 1 of 3 • 16 articles