Vulnerabilities & Exploits

02
Apr
Supply‑Chain Attack on LiteLLM Infects Thousands, Mercor Among Victims

Supply‑Chain Attack on LiteLLM Infects Thousands, Mercor Among Victims

A malicious contributor slipped back‑door code into the open‑source LiteLLM library, a widely used wrapper for prompting large
1 min read
02
Apr
Supply‑Chain Compromise of LiteLLM Hits Mercor Recruitment Platform

Supply‑Chain Compromise of LiteLLM Hits Mercor Recruitment Platform

Mercor reported that attackers published a malicious version of the open‑source LiteLLM Python package, which the company uses to
1 min read
02
Apr
Fake CERT‑UA Phishing Spreads AGEWHEEZE RAT to Millions

Fake CERT‑UA Phishing Spreads AGEWHEEZE RAT to Millions

Attackers spoofed the official Ukrainian Computer Emergency Response Team (CERT‑UA) in a large‑scale email campaign that targeted roughly
1 min read
02
Apr
New SSH/Telnet Scans, OpenSSL Exploit, and Ransomware‑Driven DDoS Spike Alert

New SSH/Telnet Scans, OpenSSL Exploit, and Ransomware‑Driven DDoS Spike Alert

The SANS Internet Storm Center observed a sharp rise in automated scans targeting SSH and Telnet services, primarily originating from
1 min read
02
Apr
Mercor Recruiting Compromised via Malicious LiteLLM Supply‑Chain Injection

Mercor Recruiting Compromised via Malicious LiteLLM Supply‑Chain Injection

Mercor, an AI‑driven recruiting platform, was breached when a compromised version of the open‑source LiteLLM library was introduced
1 min read
01
Apr
Insider‑Threat Platform Hijacked via Update Supply‑Chain Attack

Insider‑Threat Platform Hijacked via Update Supply‑Chain Attack

A threat‑actor group compromised a leading insider‑threat detection solution by injecting malicious code into a routine software update.
1 min read
01
Apr
Critical Memory‑Corruption Bug Hits Popular AI Inference Library

Critical Memory‑Corruption Bug Hits Popular AI Inference Library

Security researchers have uncovered a severe memory‑corruption flaw in an open‑source AI model inference library that is widely
1 min read
01
Apr
4️⃣ Nation‑state actors targeting cloud credential theft

4️⃣ Nation‑state actors targeting cloud credential theft

Multiple nation‑state cyber espionage groups have intensified campaigns to steal cloud service credentials. By exploiting misconfigurations and weak access
01
Apr
Critical Supply‑Chain RCE Found in Popular IoT Camera Firmware

Critical Supply‑Chain RCE Found in Popular IoT Camera Firmware

Security researchers have identified a remote code execution (RCE) flaw in the firmware of a widely used line of IoT
1 min read
01
Apr
Zero‑Day in Popular VPN Client Enables Lateral Movement Across Corporate Networks

Zero‑Day in Popular VPN Client Enables Lateral Movement Across Corporate Networks

Security researchers have uncovered a zero‑day flaw in a widely deployed VPN client that breaks tunnel isolation. By sending
1 min read