top of page
Suspicious Activity?


Lateral Movement, Dwell Time, and the Role of Microsegmentation
The impact of an attack develops after access is gained The impact of an attack is rarely defined by how access is gained, but by how far an attacker can move after entering the environment. Preventive controls still matter, but they do not determine the full outcome. What shapes the impact is how long an attacker can operate and how much of the environment they can reach before being detected and contained. In many organizations, that window remains longer than expected. Att

PAGO Networks
Apr 213 min read


Cisco FMC Zero Day Exploited
A remote code execution vulnerability CVE-2026-20131 identified in Cisco Secure Firewall Management Center (Secure FMC) has been confirmed to be actively exploited in real world attacks. Cisco disclosed the vulnerability on March 4, 2026 and provided patched versions. However, Amazon Threat Intelligence reports that the Interlock ransomware group had already been exploiting this vulnerability since January 26, 2026 . The critical point is the exploitation began before publ

Siwoo Lee
Apr 63 min read


LiteLLM Supply Chain Incident: Access Risks Across the AI Stack
This case demonstrates how centralizing access and secrets can amplify the impact of a supply chain attack It has been confirmed that versions 1.82.7 and 1.82.8 of the litellm package distributed on PyPI were tampered with and contained malicious code. According to LiteLLM’s official security notice on March 24, 2026, these versions were compromised and have since been removed from PyPI. This incident can be classified as a supply chain attack , where an open source componen

Siwoo Lee
Mar 275 min read


Ally WordPress Plugin Vulnerability CVE-2026-2413: Unauthenticated SQL Injection Explained
An unauthenticated SQL Injection vulnerability has been identified in the Ally – Web Accessibility & Usability plugin used in Elementor-based WordPress environments. With over 400,000 active installations globally, this issue has a potentially wide impact surface. However, this is not a vulnerability that can be exploited across all WordPress environments by default. Exploitation depends on specific conditions. This article outlines the affected plugin, root cause, and what s

Siwoo Lee
Mar 233 min read


The 4-Stage Attack Chain Behind North Korea's Lazarus Group and Medusa Ransomware
Broadcom's Symantec and Carbon Black Threat Hunter Team have identified activity linking North Korea's Lazarus Group to a series of Medusa ransomware attacks. U.S. healthcare organizations are among the primary targets, with cases in the Middle East also referenced. What makes this campaign worth examining closely is the activity that precedes the ransomware itself. The toolset identified by Symantec and Carbon Black is Lazarus-specific custom malware, not off-the-shelf crime

Siwoo Lee
Mar 165 min read


OpenClaw Security Alert: Agent Takeover and Malicious npm Package
Recent issues surrounding OpenClaw can be summarized in one sentence: locally running executable agents are becoming a new attack surface. According to OpenClaw’s official security documentation, this agent can perform arbitrary shell command execution, file read and write operations, network service access, and message sending depending on configuration. In other words, it goes far beyond a typical chatbot and is closer to an executable tool that actually connects and oper

Siwoo Lee
Mar 104 min read


Metro4Shell and the Changing Risk Profile of Development Environments
A critical Remote Code Execution vulnerability has been discovered in the Metro Development Server used in React Native development environments, and recent attack activity has been observed exploiting this flaw to distribute malicious payloads. The vulnerability, tracked as CVE-2025-11953 and referred to as Metro4Shell, originates from an OS Command Injection issue in the /open-url endpoint, which is provided for development convenience. This issue is particularly noteworthy

Siwoo Lee
Feb 182 min read
Subscribe to the PAGO Newsletter
bottom of page
