Cyber Security Week in Review: March 27, 2026
In brief: a Langflow AI framework flaw exploited in the wild, the LiteLLM package compromised in a TeamPCP-linked supply-chain attack, and more
In brief: a Langflow AI framework flaw exploited in the wild, the LiteLLM package compromised in a TeamPCP-linked supply-chain attack, and more
Prismex is a set of connected malware components designed to stay hidden and avoid detection.
By using WebRTC, the attackers bypass common defenses such as Content Security Policy (CSP) and HTTP-based monitoring tools.
According to reports, threat actors managed to exfiltrate data from nearly 500,000 infected devices.
The attackers reportedly bypassed two-factor authentication and, in several cases, set up automatic email forwarding.
Attackers use the ClickFix tacticts to trick candidates into running a command on their own computer.
Although there is no evidence of active exploitation, users are strongly advised to patch their instances as soon as possible.
The campaign uses a malicious script capable of wiping entire systems when Iranian configurations are detected.
Aleksei Volkov hunted for vulnerabilities in corporate networks and gained unauthorized access, which he then sold to co-conspirators.
Cameron Curry exploited his role as a data analyst contractor to access sensitive payroll and corporate data.
Showing elements 41 - 50