Category: Security

black flat screen computer monitor turned on beside black computer keyboard
Security

Leak vs Lure: How the March 2026 Claude Code source leak and InstallFix campaigns turned install guides into credential-stealing attack chains

In March 2026 an accidental release of 512,000 lines of Anthropic’s Claude Code source combined with concurrent InstallFix social‑engineering campaigns to create a single, practical threat: attackers now pair intimate knowledge of an AI agent’s internals with cloned install pages that convince developers to run one-line commands that deploy credential‑stealing malware. What the leak actually […]

admin 
a computer desk with two monitors and a laptop
Security

CrystalRAT is not just prankware — Telegram-marketed MaaS that pairs RAT access, crypto clippers, and disruptive “Rofl” tricks

CrystalRAT (aka CrystalX RAT) is being sold openly on Telegram as an easy-to-use malware package, but calling it merely “prankware” misses the point: it is a modular malware-as-a-service that combines full remote access, clipboard-based cryptocurrency theft, and nuisance/psychological disruption into a single commercially marketed toolkit. Why the “prank” label understates the risk Security vendors and […]

admin 
Programmer coding at a desk with several monitors.
Security

Mercor breach: a LiteLLM supply‑chain compromise that exfiltrated terabytes

Mercor’s recruiting platform was breached after attackers slipped malicious code into a published LiteLLM package, turning a widely reused open‑source proxy into a broad data exfiltration channel. The incident — detected and removed from distribution within hours but still exploited — exposed terabytes of sensitive material and has forced immediate, industry‑wide dependency audits and credential […]

admin 
Man and woman discussing tablet outside office building
Security

Beyond Chatbots: Why Autonomous AI Agents Introduce an Identity-First Security Risk

AI agents aren’t just smarter chatbots; they operate with distinct identities and degrees of autonomy that let them act on infrastructure and data. That identity-plus-autonomy combo requires enterprises to move security from conversational filters to identity governance, least-privilege controls, and operational checkpoints. Three agent types and why identity changes the problem Enterprises now deploy three […]

admin 
Team of hackers with Guy Fawkes masks coding in a dark room with computers.
Security

CVE-2025-53521: F5 BIG-IP APM reclassified as critical RCE — what distinguishes active exploitation from earlier DoS assessments

F5‘s BIG-IP Access Policy Manager vulnerability CVE-2025-53521—originally treated as a denial-of-service issue—was reclassified as an unauthenticated remote code execution (RCE) after March 2026 intelligence showed active exploitation. The change forced CISA into the Known Exploited Vulnerabilities (KEV) list and triggered federal patch mandates; organizations must treat this as an immediate compromise risk, not a mere […]

admin 
silver MacBook on brown wooden table
Security

Infiniti Stealer is not a macOS exploit — it weaponizes ClickFix social engineering and Nuitka-compiled Python to bypass defenses

Infiniti Stealer is a recently documented macOS infostealer that relies on a fake CAPTCHA (the ClickFix technique) and a Nuitka-compiled Python payload to evade detection — it succeeds because it manipulates users, not by exploiting a software vulnerability. How the attack actually reaches a user In observed samples the initial lure is a Cloudflare-style CAPTCHA […]

admin 
Laptop displaying code with a coffee mug nearby.
Security

TeamPCP’s Telnyx Compromise: credential-based, steganographic backdoor in PyPI releases

On March 27, 2026 the Telnyx Python SDK on PyPI was backdoored by the actor known as TeamPCP using stolen maintainer credentials — not typosquatting. Malicious code landed only in telnyx/_client.py inside published releases 4.87.1 and 4.87.2 (no corresponding GitHub tags or releases), and the package’s ~700,000 monthly-download footprint made the trojanized SDK a high-value […]

admin