GLossary

More

News

More
Axios NPM Packages Compromised

Axios npm Packages Compromised in Supply Chain Attack

The CyberSec Guru

Axios NPM packages v1.14.1 and v0.30.4 compromised. Malicious plain-crypto-js@4.2.1 dependency injected. Full technical breakdown

PyPI telnyx Package Compromised TeamPCP Supply Chain Attack

PyPI ‘telnyx’ Backdoored by TeamPCP: Hidden Payloads Inside Audio Files

The CyberSec Guru

PyPI package ‘telnyx’ versions 4.87.1 and 4.87.2 contain malware from threat actor TeamPCP. Malware runs on import, uses WAV steganography for payloads

EXCLUSIVE: China-Linked ‘Red Menshen’ Plants Kernel-Level Sleeper Cells in Global Telecom Networks

The CyberSec Guru

Discover how China-linked Red Menshen uses the stealthy, kernel-level BPFDoor backdoor to infiltrate global telecom networks and spy on users

LiteLLM Supply Chain Attack

The LiteLLM Supply Chain Attack: A Complete Technical Breakdown of the AI Ecosystem’s Darkest Hour

The CyberSec Guru

An in-depth investigative report on the March 2026 LiteLLM supply chain attack. Discover how the Trivy GitHub Actions hack led to a massive PyPI compromise

TeamPCP Supply Chain Attack

THE SILENT CASCADE: How TeamPCP Weaponized the Global Security Supply Chain to Steal Half a Million Credentials

The CyberSec Guru

Exposing the TeamPCP supply chain attack: Over 500,000 credentials stolen via backdoored LiteLLM and Trivy scanner. Full analysis and timeline

Advisory

More
AnyDesk Hacked

Remote Desktop Software AnyDesk Hacked, Users Urged to Change Passwords

AnyDesk hacked: Cyberattack compromises production systems, raising concerns over source code security and user data. Immediate actions taken, passwords revoked, and new security measures implemented

Jenkins Security Alert Critical Vulnerability Exposes Servers to Remote Code Execution (RCE) Attacks

Jenkins Security Alert: Critical Vulnerability Exposes Servers to Remote Code Execution (RCE) Attacks

Jenkins Security Alert: Critical vulnerability poses remote code execution risk. Servers exposed. Immediate action required to patch and safeguard systems against potential exploitation. Stay vigilant