Normal view

Received — 6 April 2026 The Hacker News

Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps

6 April 2026 at 13:00
Your attack surface no longer lives on one operating system, and neither do the campaigns targeting it. In enterprise environments, attackers move across Windows endpoints, executive MacBooks, Linux infrastructure, and mobile devices, taking advantage of the fact that many SOC workflows are still fragmented by platform.  For security leaders, this creates a

How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers

6 April 2026 at 11:45
The most active piece of enterprise infrastructure in the company is the developer workstation. That laptop is where credentials are created, tested, cached, copied, and reused across services, bots, build tools, and now local AI agents. In March 2026, the TeamPCP threat actor proved just how valuable developer machines are. Their supply chain attack on

❌