Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Your AI Stack Just Handed Over Your Root Keys: Inside the litellm PyPI Breach
Inteligencia artificial (IA)

Your AI Stack Just Handed Over Your Root Keys: Inside the litellm PyPI Breach

Litellm PyPI breach explained: malicious versions steal cloud credentials, SSH keys, and Kubernetes secrets. Learn impact and urgent mitigation steps.

Inteligencia artificial (IA)

Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise

TeamPCP orchestrated one of the most sophisticated multi-ecosystem supply chain campaigns publicly documented to date that cascaded through developer tooling and compromised LiteLLM, exposing how AI proxy services that concentrate API keys and cloud credentials become high-value collateral when supply chain attacks compromise upstream dependencies.

Latest News Mar 26, 2026

Save to Folio

Latest News Mar 26, 2026

Save to Folio

Cumplimiento de normativa y riesgos

Why East-West Visibility Matters for Grid Security

Learn how east-west traffic visibility helps detect and stop lateral movement attacks inside electric grid infrastructure and critical OT networks.

Consumer Focus Mar 18, 2026

Save to Folio

Consumer Focus Mar 18, 2026

Save to Folio

New Threat Trends: How Service Providers Stay Ahead

Standing still means falling behind. To me, this phrase perfectly describes the reality that cybersecurity is a continuous process.

Expert Perspective Mar 17, 2026

Save to Folio

Expert Perspective Mar 17, 2026

Save to Folio

Ciberdelincuencia

TrendAI™ Supports Global Law Enforcement Efforts

Learn how TrendAI™ and our researchers contributed threat intelligence and analysis to support INTERPOL against cybercrime.

Latest News Mar 16, 2026

Save to Folio

Latest News Mar 16, 2026

Save to Folio

Ransomware

Web Shells, Tunnels, and Ransomware: Dissecting a Warlock Attack

Warlock continues to enhance its attack chain with new tactics to improve persistence, lateral movement, and defense evasion using an expanded toolset: TightVNC Yuze, and a persistent BYOVD technique leveraging the NSec driver.

Latest News Mar 16, 2026

Save to Folio

Latest News Mar 16, 2026

Save to Folio

Inteligencia artificial (IA)

Securing Autonomous AI Agents with TrendAI & NVIDIA OpenShell

Learn how TrendAI and NVIDIA OpenShell help secure autonomous AI agents and build trusted enterprise AI systems with stronger visibility and control.

Latest News Mar 16, 2026

Save to Folio

Latest News Mar 16, 2026

Save to Folio

Malware

Through the Lens of MDR: Analysis of KongTuke’s ClickFix Abuse of Compromised WordPress Sites

Our analysis of an active KongTuke campaign deploying modeloRAT — malware capable of reconnaissance, command execution, and persistent access — through compromised WordPress sites and fake CAPTCHA lures shows that the group still operates this delivery chain in parallel with the newer CrashFix technique.

Research Mar 10, 2026

Save to Folio

Research Mar 10, 2026

Save to Folio