13 min read
LiteLLM PyPI Supply Chain Attack: What Happened & How to Fix It
Overview
On March 24, 2026, two malicious versions of the litellm Python package - v1.82.7 and v1.82.8 - were published to PyPI as part of a broader...
KEEP READINGPartner Programs
Technology Partners
Key Resources
Harsha Koushik is a security engineer and researcher turned product manager, focused on building and securing systems at scale. With deep experience in cloud-native security and CNAPP, he has worked on tackling emerging threats across complex environments. Now, he’s exploring the other side of the equation—the art of building, shipping, and selling products—bridging technical depth with product thinking. Harsha also hosts the Kernel-Space podcast, and has presented at conferences including BlackHat USA, DefCon, and DefCon Cloud Village.
13 min read
On March 24, 2026, two malicious versions of the litellm Python package - v1.82.7 and v1.82.8 - were published to PyPI as part of a broader...
KEEP READING2 min read
Jul 25, 2025 by Michael Beavers
Most security operations centers struggle with scale, complexity, and context....
1 min read
Jul 20, 2023 by Netenrich
Netenrich has entered into a strategic partnership with Cybriant, a leading ...
4 min read
Jul 18, 2023 by John Pirc
To keep an enterprise up and running, security is essential—and no doubt, why...
4 min read
Jun 30, 2025 by Netenrich
Google Chronicle, part of Google SecOps, is a powerful tool for security data...
8 min read
Feb 20, 2025 by Netenrich
The Chief Information Security Officer (CISO) role has transformed from being...
4 min read
Sep 17, 2024 by Raju Chekuri
Traditional SIEMs just aren’t cutting it anymore. They rely on outdated,...
9 min read
Nov 12, 2025 by Netenrich
Cyberattacks rarely begin with masterful exploits. They start with small...
8 min read
Nov 11, 2025 by Netenrich
On a regular Monday morning, Maya, an SOC lead, logs into her company’s asset...
7 min read
Nov 11, 2025 by Netenrich
Security Operations Centers (SOCs) are busier than ever. However, are they more...
The best source of information for Security, Networks, Cloud, and ITOps best practices. Join us.
