Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Your AI Stack Just Handed Over Your Root Keys: Inside the litellm PyPI Breach
Artificial Intelligence (AI)

Your AI Stack Just Handed Over Your Root Keys: Inside the litellm PyPI Breach

Litellm PyPI breach explained: malicious versions steal cloud credentials, SSH keys, and Kubernetes secrets. Learn impact and urgent mitigation steps.

Artificial Intelligence (AI)

Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise

TeamPCP orchestrated the first publicly documented multi-ecosystem supply chain campaign specifically targeting AI infrastructure. The concentration of high-value credentials in a small number of widely adopted packages makes the AI ecosystems a high-value target for this class of attack.

Latest News 26/03/2026

Save to Folio

Latest News 26/03/2026

Save to Folio

Compliance & Risks

Why East-West Visibility Matters for Grid Security

Learn how east-west traffic visibility helps detect and stop lateral movement attacks inside electric grid infrastructure and critical OT networks.

Consumer Focus 18/03/2026

Save to Folio

Consumer Focus 18/03/2026

Save to Folio

Cyber Crime

TrendAI™ Supports Global Law Enforcement Efforts

Learn how TrendAI™ and our researchers contributed threat intelligence and analysis to support INTERPOL against cybercrime.

Latest News 16/03/2026

Save to Folio

Latest News 16/03/2026

Save to Folio

Ransomware

Web Shells, Tunnels, and Ransomware: Dissecting a Warlock Attack

Warlock continues to enhance its attack chain with new tactics to improve persistence, lateral movement, and defense evasion using an expanded toolset: TightVNC Yuze, and a persistent BYOVD technique leveraging the NSec driver.

Latest News 16/03/2026

Save to Folio

Latest News 16/03/2026

Save to Folio

Artificial Intelligence (AI)

Securing Autonomous AI Agents with TrendAI & NVIDIA OpenShell

Learn how TrendAI and NVIDIA OpenShell help secure autonomous AI agents and build trusted enterprise AI systems with stronger visibility and control.

Latest News 16/03/2026

Save to Folio

Latest News 16/03/2026

Save to Folio

Malware

Through the Lens of MDR: Analysis of KongTuke’s ClickFix Abuse of Compromised WordPress Sites

Our analysis of an active KongTuke campaign deploying modeloRAT — malware capable of reconnaissance, command execution, and persistent access — through compromised WordPress sites and fake CAPTCHA lures shows that the group still operates this delivery chain in parallel with the newer CrashFix technique.

Research 10/03/2026

Save to Folio

Research 10/03/2026

Save to Folio

Artificial Intelligence (AI)

CISOs in a Pinch: A Security Analysis of OpenClaw

Learn about OpenClaw (a sovereign agent) and how this can be viable for enterprises.

Expert Perspective 10/03/2026

Save to Folio

Expert Perspective 10/03/2026

Save to Folio