top of page
Suspicious Activity?


LiteLLM Supply Chain Incident: Access Risks Across the AI Stack
This case demonstrates how centralizing access and secrets can amplify the impact of a supply chain attack It has been confirmed that versions 1.82.7 and 1.82.8 of the litellm package distributed on PyPI were tampered with and contained malicious code. According to LiteLLM’s official security notice on March 24, 2026, these versions were compromised and have since been removed from PyPI. This incident can be classified as a supply chain attack , where an open source componen

Siwoo Lee
Mar 275 min read


The 4-Stage Attack Chain Behind North Korea's Lazarus Group and Medusa Ransomware
Broadcom's Symantec and Carbon Black Threat Hunter Team have identified activity linking North Korea's Lazarus Group to a series of Medusa ransomware attacks. U.S. healthcare organizations are among the primary targets, with cases in the Middle East also referenced. What makes this campaign worth examining closely is the activity that precedes the ransomware itself. The toolset identified by Symantec and Carbon Black is Lazarus-specific custom malware, not off-the-shelf crime

Siwoo Lee
Mar 165 min read


Developer Tools as an Entry Point: Security Risks in Widely Used VS Code Extensions
"Developer tools interact directly with sensitive resources and operational systems, which means weaknesses within those tools can become meaningful entry points for attackers". Several widely used Visual Studio Code extensions have recently been associated with security vulnerabilities that may impact developer workstations. Unlike typical security issues that affect production servers or exposed infrastructure, these vulnerabilities highlight a different risk: the developme

Siwoo Lee
Mar 93 min read


Phishing 3.0: AI Generated Phishing and Identity Based Attacks
Phishing has long been treated as a communication problem. Attackers send deceptive messages, employees make mistakes, and organizations respond with filtering controls and awareness programs. Despite sustained investment in both technical defenses and user training, phishing remains one of the most consistent initial access vectors in reported cyber incidents. The FBI Internet Crime Complaint Center continues to rank phishing and business email compromise among the highest c

PAGO Networks
Feb 234 min read


Metro4Shell and the Changing Risk Profile of Development Environments
A critical Remote Code Execution vulnerability has been discovered in the Metro Development Server used in React Native development environments, and recent attack activity has been observed exploiting this flaw to distribute malicious payloads. The vulnerability, tracked as CVE-2025-11953 and referred to as Metro4Shell, originates from an OS Command Injection issue in the /open-url endpoint, which is provided for development convenience. This issue is particularly noteworthy

Siwoo Lee
Feb 182 min read


CyberAttacks in 2026: Why Response Speed Matters More Than Prediction
Every year the same question shows up in cybersecurity discussions. What attacks should we expect next year? Which threats are growing? What the data is telling us? But it is worth asking whether this is even the right question. For years, cybersecurity conversations have focused on how advanced attacks are becoming. New techniques, new tools, more automation on the attacker side. That story is familiar and partly true. But recent incident data points to something more uncomf

PAGO Networks
Jan 73 min read


The Importance of Regular Penetration Testing for Web Applications
Modern organizations rely on web applications for everything from customer portals to internal operations. This dependence also makes them one of the main targets for cyberattacks. Regular penetration testing is now the foundation for maintaining trust, protecting data, and ensuring the resilience of digital services. Nowadays, developers work under pressure to release features fast, and even with security reviews, small oversights can slip through. Penetration testing expose

PAGO Networks
Nov 5, 20252 min read


How to Keep AI From Turning Against Your Defense
A few months ago, security researchers revealed that a group of attackers had trained an AI system to manage a ransomware operation on...

PAGO Networks
Oct 10, 20253 min read


Technology is Just the Beginning... Real Security is Won in Operations.
Preemptive. Proactive. Containment. At this very moment, global security strategy is converging on these three words. More important than the type or performance of technology is how early a threat can be detected (Preemptive) , how actively it can be responded to (Proactive) , and how effectively the spread of damage can be blocked (Containment) . The core, ultimately, is 'operations' . This trend was clearly confirmed at the RSA Conference 2025 held in San Francisco this Ap

Paul Kwon
Jul 31, 20252 min read


Stellar Cyber × PAGO MDR: From Visibility to Response
This is not just another XDR. Only when the visibility of Open XDR meets PAGO’s ability to judge and act in real time can threats truly...

PAGO Networks
Jul 2, 20253 min read


When SentinelOne detects a threat, PAGO responds immediately.
Where technology meets execution, that is what defines PAGO MDR . Even the most advanced tools are not enough if there is no partner who...

PAGO Networks
Jun 30, 20253 min read


300% Surge in AI Driven Tax Scams Reported in Australia
Trust in digital communications has become more fragile than ever. In recent weeks Australian authorities have sounded the alarm on a...

PAGO Networks
Jun 19, 20252 min read


A Three-Part Reflection Series on MDR and PAGO Security Summit by SharedIT
Following the 2025 PAGO Security Summit , Jang Doohwan from SharedIT published a three-part deep-dive series unpacking how Managed...

PAGO Networks
May 29, 20251 min read


Beyond MDR: How Preemptive Response Raises the Bar
Cybersecurity threats are becoming faster, more sophisticated, and increasingly targeted. In response, many organizations rely on Managed...

PAGO Networks
Apr 21, 20252 min read


DataNet Korea Spotlights PAGO Networks as Top MDR Provider
PAGO Networks is accelerating its growth trajectory in the Managed Detection and Response (MDR) market, solidifying its position as one...

PAGO Networks
Apr 18, 20252 min read
Subscribe to the PAGO Newsletter
bottom of page
