Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
malware
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Litellm 1.82.7/8 Compromised: Credential-Stealing Malware Detected, Seek Alternative Solutions
Roman Dubrovin
Roman Dubrovin
Roman Dubrovin
Follow
Mar 25
Litellm 1.82.7/8 Compromised: Credential-Stealing Malware Detected, Seek Alternative Solutions
#
security
#
malware
#
ai
#
alternatives
Comments
Add Comment
7 min read
Malicious litellm 1.82.8: Credential Theft and Persistent Backdoor in AI Workflows
Arkaprabha Banerjee
Arkaprabha Banerjee
Arkaprabha Banerjee
Follow
Mar 25
Malicious litellm 1.82.8: Credential Theft and Persistent Backdoor in AI Workflows
#
artificialintelligen
#
cybersecurity
#
malware
#
mlops
Comments
Add Comment
3 min read
Compromised Litellm PyPI Packages (v1.82.7, v1.82.8) Expose Users to Security Risks: Mitigation Steps Available
Artyom Kornilov
Artyom Kornilov
Artyom Kornilov
Follow
Mar 24
Compromised Litellm PyPI Packages (v1.82.7, v1.82.8) Expose Users to Security Risks: Mitigation Steps Available
#
security
#
pypi
#
malware
#
compromise
Comments
Add Comment
12 min read
Trivy Project Compromised by Malicious Supply Chain Attack: Enhanced CI/CD Security Measures Proposed
Marina Kovalchuk
Marina Kovalchuk
Marina Kovalchuk
Follow
Mar 25
Trivy Project Compromised by Malicious Supply Chain Attack: Enhanced CI/CD Security Measures Proposed
#
cybersecurity
#
supplychain
#
cicd
#
malware
Comments
Add Comment
12 min read
🚨 Malware Found in AI Agent Skills: A Security Advisory
airano
airano
airano
Follow
Mar 20
🚨 Malware Found in AI Agent Skills: A Security Advisory
#
ai
#
security
#
malware
#
opensource
Comments
Add Comment
2 min read
WP Malware Sentinel: Signature-Based Scanning That Scales With the Threat Landscape
victorstackAI
victorstackAI
victorstackAI
Follow
Mar 17
WP Malware Sentinel: Signature-Based Scanning That Scales With the Threat Landscape
#
wordpress
#
drupal
#
security
#
malware
1
 reaction
Comments
Add Comment
4 min read
Operation Epic Fury: the Iranian C2 nobody found (0/94 VT, RDTSC sandbox evasion, 8 months pre-op)
Paolo Costanzo
Paolo Costanzo
Paolo Costanzo
Follow
Mar 17
Operation Epic Fury: the Iranian C2 nobody found (0/94 VT, RDTSC sandbox evasion, 8 months pre-op)
#
security
#
threatintel
#
osint
#
malware
Comments
Add Comment
2 min read
GlassWorm Malware Campaign Steals Crypto Seeds via Obfuscation, Chrome Exploit, and Social Engineering: Mitigation Strategies
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 19
GlassWorm Malware Campaign Steals Crypto Seeds via Obfuscation, Chrome Exploit, and Social Engineering: Mitigation Strategies
#
malware
#
cryptocurrency
#
obfuscation
#
exploitation
1
 reaction
Comments
Add Comment
10 min read
Update: pecheck.py Version 0.7.20
Mark0
Mark0
Mark0
Follow
Mar 13
Update: pecheck.py Version 0.7.20
#
cybersecurity
#
infosec
#
malware
#
tools
1
 reaction
Comments
Add Comment
1 min read
Zombie ZIP Vulnerability Enables Malware to Bypass 95% of Antivirus Software, Requiring Urgent Security Updates
Olga Larionova
Olga Larionova
Olga Larionova
Follow
Mar 13
Zombie ZIP Vulnerability Enables Malware to Bypass 95% of Antivirus Software, Requiring Urgent Security Updates
#
cybersecurity
#
malware
#
vulnerability
#
antivirus
Comments
Add Comment
8 min read
Agent.BTZ — how one USB stick rewrote modern cyber defence
HelixCipher
HelixCipher
HelixCipher
Follow
Mar 14
Agent.BTZ — how one USB stick rewrote modern cyber defence
#
cybersecurity
#
supplychainsecurity
#
airgap
#
malware
1
 reaction
Comments
Add Comment
2 min read
OpenClaw npm Malware: Fake Package Deploys GhostLoader RAT
Daniel Samer
Daniel Samer
Daniel Samer
Follow
Mar 16
OpenClaw npm Malware: Fake Package Deploys GhostLoader RAT
#
security
#
npm
#
openclaw
#
malware
1
 reaction
Comments
Add Comment
2 min read
Detecting and Mitigating Unauthorized Surveillance: Strategies to Protect Personal Devices from State and Non-State Actors
Denis Lavrentyev
Denis Lavrentyev
Denis Lavrentyev
Follow
Mar 16
Detecting and Mitigating Unauthorized Surveillance: Strategies to Protect Personal Devices from State and Non-State Actors
#
surveillance
#
cybersecurity
#
iot
#
malware
1
 reaction
Comments
Add Comment
13 min read
VoicePress5: Tracing a Phishing-to-Java RAT Infection Chain
JP Dias
JP Dias
JP Dias
Follow
Mar 17
VoicePress5: Tracing a Phishing-to-Java RAT Infection Chain
#
phishing
#
malware
#
rat
#
infosec
Comments
Add Comment
10 min read
Gamers Beware: Fake Roblox and Xeno Tools Are Spreading a Windows RAT
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Mar 2
Gamers Beware: Fake Roblox and Xeno Tools Are Spreading a Windows RAT
#
malware
#
security
#
powershell
#
gaming
Comments
Add Comment
2 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account