Interactive Brokers Phishing Scam: Fake IRS W-8BEN Renewal Alert
By Don Santos, Cofense Phishing Defense Center Online trading platforms are popular among investors. Both beginners and professionals use them to study the financial markets,...
The difficulty of making sure your website is broken
Have you ever needed to make sure your website has a broken certificate? While many tools exist to help run an HTTPS server with...
CASI Leaderboard Shifts: Developer Role Attack, and Three Concerning Incidents
AI Security Insights – April 2026 - Read more
Hackers Exploit Adobe PDF Flaw for Months to Steal Data, No Fix Yet
A critical Adobe Acrobat zero-day has been exploited for months via malicious PDFs to steal data and potentially take over systems, with no patch...
The threat hunter’s gambit
Welcome to this week’s edition of the Threat Source newsletter. “Study hard what interests you the most in the most undisciplined, irreverent and original manner...
STX RAT Targets Finance Sector With Advanced Stealth Tactics
STX RAT, a newly identified remote access trojan, attempted deployment in finance, showing advanced C2 and stealthy delivery methods - Read more
Contemporary Controls BASC 20T
View CSAF
Summary
Successful exploitation of this vulnerability could allow an attacker to enumerate the functionality of each component associated with the PLC, reconfigure, rename, delete,...
Anthropic Claude Code Action Runner Arbitrary Code Execution via Malicious MCP Server Configuration
Anthropic Claude Code Action Runner Arbitrary Code Execution via Malicious MCP Server Configuration The claude-code-action GitHub Action checks out the PR head branch when...
The long road to your crypto: ClipBanker and its marathon infection chain
At the start of the year, a certain Trojan caught our eye due to its incredibly long infection chain. In most cases, it kicks...









