News

Anthropic Mythos Breach: Unauthorized Group Gets Into “Too Dangerous” Cyber-AI Model
An unauthorized group has reportedly gained access to Anthropic's Mythos, the "superhacker" AI model. Read the full report on the breach

ShinyHunters Claims Massive Rockstar Games Breach via Anodot-Snowflake Integration
Report on the Rockstar Games Snowflake breach. Learn how ShinyHunters used Anodot to bypass security, the data at risk, and the April 14 deadline

BrowserGate: Inside the Microsoft-LinkedIn Data Breach and Global Espionage Operation
BrowserGate: How Microsoft-owned LinkedIn illegally scans 1 billion computers for 6,222 extensions to steal trade secrets and profile users.

Adobe Data Breach: The “Mr. Raccoon” 13M Ticket Leak and The Vulnerability of The BPO Supply Chain
Report on the alleged Adobe data breach. Threat actor Mr. Raccoon claims 13M support tickets, 15k employee records and HackerOne data leaked via BPO.

THE MERCOR COLLAPSE: Inside the 4TB Lapsus$ Data Breach and the Supply Chain Attack That Gutted a $10 Billion AI Giant
Massive 4TB Mercor AI data breach by Lapsus$. 211GB of PII, 939GB of source code, and 3TB of video interviews leaked. Detailed attack chain

The Cisco Blackout: Inside the ShinyHunters Breach and the Trivy Supply Chain Collapse
Cisco data breach by ShinyHunters. 300+ GitHub repos stolen, 3M Salesforce records leaked via Trivy supply chain attack. Get the full technical breakdown.

Axios npm Packages Compromised in Supply Chain Attack
Axios NPM packages v1.14.1 and v0.30.4 compromised. Malicious plain-crypto-js@4.2.1 dependency injected. Full technical breakdown

PyPI ‘telnyx’ Backdoored by TeamPCP: Hidden Payloads Inside Audio Files
PyPI package 'telnyx' versions 4.87.1 and 4.87.2 contain malware from threat actor TeamPCP. Malware runs on import, uses WAV steganography for payloads

EXCLUSIVE: China-Linked ‘Red Menshen’ Plants Kernel-Level Sleeper Cells in Global Telecom Networks
Discover how China-linked Red Menshen uses the stealthy, kernel-level BPFDoor backdoor to infiltrate global telecom networks and spy on users

The LiteLLM Supply Chain Attack: A Complete Technical Breakdown of the AI Ecosystem’s Darkest Hour
An in-depth investigative report on the March 2026 LiteLLM supply chain attack. Discover how the Trivy GitHub Actions hack led to a massive PyPI compromise





