Intelligence · Updated daily

Security Intelligence

AI-analysed threats, vulnerabilities and campaigns. Not just what happened — what it means, who's affected, and what to do about it.

Page 4 of 17

76–100 of 401
mediumSupply ChainContained

Anthropic's Claude Code source leaked via NPM: supply-chain exposure without credential compromise

Anthropic accidentally published Claude Code's closed-source implementation to NPM, exposing proprietary code but not customer data or authentication credentials. The leak represents a supply-chain accident rather than an exploitable vulnerability, though source code disclosure carries competitive and reverse-engineering risks.

Anthropic Claude Code, NPM ecosystem
highVulnerabilityEmerging

Anritsu Remote Spectrum Monitor: Unauthenticated Configuration Alteration in Critical RF Test Equipment

CVE-2026-3356 affects all versions of Anritsu's Remote Spectrum Monitor series, allowing network-accessible attackers to modify operational settings, exfiltrate signal intelligence, or cause denial of service. The vulnerability impacts spectrum analysis infrastructure used in telecommunications and defence sectors.

CVE-2026-3356
Anritsu Remote Spectrum Monitor MS27100A, Anritsu Remote Spectrum Monitor MS27101A, Anritsu Remote Spectrum Monitor MS27102A +1
criticalVulnerabilityActive

Authentication & Authorization Bypass in mpp Payment Handler - Request Replay and Session Hijacking

mpp versions before 0.8.0 contain multiple authentication bypass vulnerabilities allowing attackers to replay payment requests, hijack session channels, and manipulate fee responsibility. This PoC matters for defenders as it demonstrates systemic weaknesses in request validation and session management that affect financial transaction integrity.

GHSA-fxc9-7j2w-vx54
mpp/<0.8.0
criticalSupply ChainActive

TeamPCP Exploits PyPI Trust Model with Steganographic Malware Distribution via Compromised Telnyx Package

TeamPCP compromised the legitimate Telnyx package on PyPI and uploaded malicious versions that extract credential-stealing malware from embedded WAV files. This represents a direct attack on Python's package supply chain affecting any developer who installed the backdoored version.

Telnyx Python package on PyPI, Python developers and applications using compromised versions