Popular LiteLLM Backdoored, U.S. Bans Foreign Routers, Device Code Phishing Surge

THN Daily Updates
Newsletter
cover

Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk ($45.00 Value) FREE for a Limited Time

You will be breached--the only question is whether you'll be ready.

Download Now Sponsored
LATEST NEWS Mar 25, 2026

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

In September 2025, Anthropic disclosed that a state-sponsored threat actor used an AI coding agent to execute an autonomous cyber espionage campaign against 30 global targets. The AI handled 80-90% of tactical operation...

Read More
Twitter Facebook LinkedIn

Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks

The U.S. Department of Justice (DoJ) said a Russian national has been sentenced to two years in prison for managing a botnet that was used to launch ransomware attacks against U.S. companies. Ilya Angelov, 40, of Tolyat...

Read More
Twitter Facebook LinkedIn

AI App Security Starts with SEC545 in Chicago

Learn to secure LLM-powered apps and mitigate AI-specific threats.

Read More
Twitter Facebook LinkedIn

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

Cybersecurity researchers are calling attention to an active device code phishing campaign that's targeting Microsoft 365 identities across more than 340 organizations in the U.S., Canada, Australia, New Zealand, and Ge...

Read More
Twitter Facebook LinkedIn

FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns

The U.S. Federal Communications Commission (FCC) said on Monday that it was banning the import of new, foreign-made consumer routers, citing "unacceptable" risks to cyber and national security. The action was designed t...

Read More
Twitter Facebook LinkedIn

Why Institutions of Higher Education Face Unique Identity Security and Management Risk

Hybrid identity gaps and high user turnover create orphaned accounts in universities, increasing attack surface and breach risk.

Read More
Twitter Facebook LinkedIn

TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 via Trivy CI/CD Compromise

TeamPCP, the threat actor behind the recent compromises of Trivy and KICS, has now compromised a popular Python package named litellm, pushing two malicious versions containing a credential harvester, a Kubernetes later...

Read More
Twitter Facebook LinkedIn

Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR

A large-scale malvertising campaign active since January 2026 has been observed targeting U.S.-based individuals searching for tax-related documents to serve rogue installers for ConnectWise ScreenConnect that drop a to...

Read More
Twitter Facebook LinkedIn
cover

Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk ($45.00 Value) FREE for a Limited Time

You will be breached--the only question is whether you'll be ready.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi