Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
The Threat
Qilin and Warlock ransomware operators are weaponizing vulnerable third-party drivers to disable over 300 endpoint detection and response
How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers
The Vulnerability
LiteLLM, a popular open-source library that abstracts API calls across multiple large language models, contained a critical flaw
⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More
The Main Story
Axios news organization suffered a breach, compromising journalist credentials and internal communications. This isn't just
Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps
The Problem
Threat actors are exploiting a fundamental operational weakness: most organizations run heterogeneous environments spanning Windows, Linux, macOS, and
DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea
North Korean threat actors are exploiting GitHub repositories as command-and-control (C2) infrastructure in multi-stage attacks against South Korean targets, according
Chrome's Fourth Zero-Day of 2026: CVE-2026-5281 Patched After Active Exploitation
Google has patched CVE-2026-5281, a use-after-free vulnerability in Dawn,
Chrome's WebGPU implementation. This marks the fourth Chrome zero-day
EU Commission Cloud Hack: At Least 29 Entities Affected
The European Commission has confirmed what many feared — the cyberattack
against its cloud infrastructure was far worse than initially disclosed.
LinkedIn Is Scanning Your Browser Extensions — Here's What We Know
A new report dubbed "BrowserGate" has surfaced this week, and it's raising
serious questions about Microsoft&
North Korea Stole $285M from Drift Protocol in a 6-Month Operation
The cryptocurrency world was hit hard again — this time by one of the most
meticulously planned heists in DeFi history.