6bb00601b72852042864946ac3752c277b697f5a
Two phishing campaigns hit Glaztech on 2026-04-17 bypassing MailProtector via exposed M365 MX record. Spoofed internal senders, forwarded by 8 users. Fixes applied: removed direct M365 MX, DMARC p=reject, Enhanced Filtering on inbound connector. 32 messages purged across all affected mailboxes. Forensic samples + full incident report preserved. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Description
Custom Claude Code behaviors and workflows - Multi-mode operation system
Languages
MDX
55.2%
Visual Basic 6.0
40%
Python
1.3%
QuickBASIC
0.7%
HTML
0.7%
Other
1.9%