Critical n8n RCEs, NGINX Servers Hijacked, MS Tool Detects LLM Backdoors

THN Daily Updates
Newsletter
cover

Webinar ➞ How Context Aware Forensics and AI Fuel Faster Cloud Investigations

Cloud forensics is broken -- slow, fragmented, and built for yesterday’s threats. This session reveals how AI-driven investigation is redefining incident response, giving security teams instant visibility, faster root-cause analysis, and complete confidence across multi-cloud environments.

Download Now Sponsored
LATEST NEWS Feb 5, 2026

The Buyer's Guide to AI Usage Control

Today's "AI everywhere" reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and a rapidly expanding universe of shadow tools that appear faster tha...

Read More
Twitter Facebook LinkedIn

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as it readied new command-and-control (C2) infrastructure coinciding with the end...

Read More
Twitter Facebook LinkedIn

Zero Trust + AI: Firewalls Are Obsolete in the AI Era

To innovate with AI and empower your workforce to safely use GenAI, you need a modern zero trust architecture.

Read More
Twitter Facebook LinkedIn

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution of arbitrary system commands. The flaw, tracked as CVE-202...

Read More
Twitter Facebook LinkedIn

How to Secure Your Mid-Market Business Across the Complete Threat Lifecycle

Mid-market organizations struggle with security tool complexity, underused EDR, and gaps that native XDR and prevention can reduce.

Read More
Twitter Facebook LinkedIn

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it through the attacker's i...

Read More
Twitter Facebook LinkedIn

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models (LLMs) and improve the overall trust in artificial intelligence (AI) systems. The tech ...

Read More
Twitter Facebook LinkedIn

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

Threat hunters have disclosed details of a new, stealthy malware campaign dubbed DEAD#VAX that employs a mix of "disciplined tradecraft and clever abuse of legitimate system features" to bypass traditional detection mec...

Read More
Twitter Facebook LinkedIn
cover

Webinar ➞ How Context Aware Forensics and AI Fuel Faster Cloud Investigations

Cloud forensics is broken -- slow, fragmented, and built for yesterday’s threats. This session reveals how AI-driven investigation is redefining incident response, giving security teams instant visibility, faster root-cause analysis, and complete confidence across multi-cloud environments.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi