The full post-mortem of the Mercor breach: how a cascading supply chain attack through Trivy and LiteLLM gave Lapsus$ full VPN access to an AI hiring platform trusted by OpenAI and Anthropic.
How attackers weaponized a trusted vulnerability scanner to hijack 95 million monthly downloads, harvest credentials, and deploy privileged pods across Kubernetes clusters.
How attackers embed malicious instructions in calendar invites, emails, and documents to hijack AI assistants — and how Calendar Sentry's security patch stops it.
Vibe-coded applications skip authentication, hardcode secrets, and ship without security headers. API Phantom is a drop-in framework that fixes all of it.
How a single malicious Google Calendar invite gave attackers control of Gemini's AI assistant, exfiltrated emails, and opened smart home windows — without the victim clicking anything.