Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from...

Recorded Future is expanding its payment fraud prevention capabilities through a partnership with CYBERA, the industry leader in detecting and verifying data on...

Elastic Stack 9.3.1 released

Version 9.3.1 of the Elastic Stack was released today. We recommend you upgrade to this latest version. We recommend 9.3.1 over the previous versions...

Google Cloud Platform (GCP) Vertex AI Workbench Cross-Tenant Full Account Takeover with Managed End...

Google Cloud Platform (GCP) Vertex AI Workbench Cross-Tenant Full Account Takeover with Managed End User Credentials Tenable Research has identified and responsibly disclosed a...

Hackers Can Abuse Cortex XDR Live Terminal Feature for C2 Communications

A newly disclosed research finding has revealed that Palo Alto Networks’ Cortex XDR Live Terminal feature can be turned into a command-and-control (C2) channel...

Active exploitation of Cisco Catalyst SD-WAN by UAT-8616

Cisco Talos is tracking the active exploitation of CVE-2026-20127, a vulnerability in Cisco Catalyst SD-WAN Controller, formerly vSmart, that allows an unauthenticated remote attacker...

Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files...

By Aviv Donenfeld and Oded Vanunu Executive Summary Check Point Research has discovered critical vulnerabilities in Anthropic’s Claude Code that allow attackers to achieve...

Cisco Catalyst SD-WAN users targeted in series of cyber attacks

The NCSC, Cisa, and other Five Eyes agencies have warned of mass exploitation of vulnerabilities in Cisco Catalyst SD-WAN, which Cisco is attributing to...

CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems

The purpose of this Alert is to provide resources for organizations with Cisco Software-Defined Wide-Area Networking (SD-WAN) systems, including Federal Civilian Executive Branch (FCEB)...

Microsoft warns of job‑themed repo lures targeting developers with multi‑stage backdoors

Microsoft says it has uncovered a coordinated campaign targeting software developers through malicious repositories posing as legitimate Next.js projects and...

Latest article

Looking at the SmarterMail API Vulnerability CVE-2026-24423

Sensor Intel Series: February 2026 CVE Trends - Read more

Security Flaw in WordPress Plugin Puts 400,000 Websites at Risk

A security flaw in the Ally WordPress plugin used on more than 400,000 sites could allow attackers to extract sensitive data without logging in. The...

Medical giant Stryker crippled after Iranian hackers remotely wipe computers

A major cyberattack on US medical supplies giant Stryker has resulted in thousands of devices being remotely wiped, after a...

This one’s for you, Mom

Welcome to this week’s edition of the Threat Source newsletter. I am the product of a single parent, my mom, who along with my grandparents...