GLossary

More

News

More
Mercor AI Data Breach

THE MERCOR COLLAPSE: Inside the 4TB Lapsus$ Data Breach and the Supply Chain Attack That Gutted a $10 Billion AI Giant

The CyberSec Guru

Massive 4TB Mercor AI data breach by Lapsus$. 211GB of PII, 939GB of source code, and 3TB of video interviews leaked. Detailed attack chain

Cisco Data Breach

The Cisco Blackout: Inside the ShinyHunters Breach and the Trivy Supply Chain Collapse

The CyberSec Guru

Cisco data breach by ShinyHunters. 300+ GitHub repos stolen, 3M Salesforce records leaked via Trivy supply chain attack. Get the full technical breakdown.

Axios NPM Packages Compromised

Axios npm Packages Compromised in Supply Chain Attack

The CyberSec Guru

Axios NPM packages v1.14.1 and v0.30.4 compromised. Malicious plain-crypto-js@4.2.1 dependency injected. Full technical breakdown

PyPI telnyx Package Compromised TeamPCP Supply Chain Attack

PyPI ‘telnyx’ Backdoored by TeamPCP: Hidden Payloads Inside Audio Files

The CyberSec Guru

PyPI package ‘telnyx’ versions 4.87.1 and 4.87.2 contain malware from threat actor TeamPCP. Malware runs on import, uses WAV steganography for payloads

EXCLUSIVE: China-Linked ‘Red Menshen’ Plants Kernel-Level Sleeper Cells in Global Telecom Networks

The CyberSec Guru

Discover how China-linked Red Menshen uses the stealthy, kernel-level BPFDoor backdoor to infiltrate global telecom networks and spy on users

Advisory

More
AnyDesk Hacked

Remote Desktop Software AnyDesk Hacked, Users Urged to Change Passwords

AnyDesk hacked: Cyberattack compromises production systems, raising concerns over source code security and user data. Immediate actions taken, passwords revoked, and new security measures implemented

Jenkins Security Alert Critical Vulnerability Exposes Servers to Remote Code Execution (RCE) Attacks

Jenkins Security Alert: Critical Vulnerability Exposes Servers to Remote Code Execution (RCE) Attacks

Jenkins Security Alert: Critical vulnerability poses remote code execution risk. Servers exposed. Immediate action required to patch and safeguard systems against potential exploitation. Stay vigilant