Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.
| 2 Mar 2026 | |
| Written by Gabi Gerber | |
| Attacks & Threats |
Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration — Security vulnerabilities in Anthropic Claude Code could have allowed attackers to remotely execute code on users' machines and steal API keys by injecting malicious configurations into repositories, and then waiting for an unsuspecting developer to clone and open an untrustworthy project. The vulnerabilities were addressed between September 2025 and January 2026. "The ability to execute arbitrary commands through repository-controlled configuration files created severe supply chain risks, where a single malicious commit could compromise any developer working with the affected repository," Check Point said. "The integration of AI into development workflows brings tremendous productivity benefits, but also introduces new attack surfaces that weren't present in traditional tools." Read more
Microsoft says the financially motivated cybercrime group has exploited N-day and zero-day vulnerabilities in campaigns predicated on speed. More...
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer. More...
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly… More...
Object First's Cusimano on Why Backup Storage Is Now a Prime Ransomware Target More...
Threats actors pounced on the code injection vulnerability within hours of its disclosure, demonstrating that organizati… More...
Microsoft says the financially motivated cybercrime group has exploited N-day and zero-day vulnerabilities in campaigns predicated on speed. More...
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer. More...
ImmuniWeb is hosting an interactive webinar “Web, Mobile & Cloud Penetration Testing in 2026: Best Practices” for all ou… More...
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly… More...
Object First's Cusimano on Why Backup Storage Is Now a Prime Ransomware Target More...