Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Industry News

Will AI Save Consumers From Smartphone-Based Phishing Attacks?

Dark Reading
Industry News

Will AI Save Consumers From Smartphone-Based Phishing Attacks?

Sophisticated phishing attacks are bypassing on-device protections with troubling frequency, making it more critical than ever for users to protect themselves from potential threats, new research from Omdia shows.

Dark ReadingMar 13, 20261m8
Starbucks Data Breach Impacts Employees
SecurityWeek
Industry News

Starbucks Data Breach Impacts Employees

Starbucks said the incident involved phishing attacks targeting an employee portal, affecting hundreds.

SecurityWeekMar 13, 20262m10
INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
The Hacker News
Industry News

INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime

INTERPOL dismantled 45,000 malicious IPs in Operation Synergia across 72 countries, disrupting global phishing and ransomware networks.

The Hacker NewsMar 13, 20264m10
In Other News: N8n Flaw Exploited, Slopoly Malware, Interpol Cybercrime Crackdown
SecurityWeek
Industry News

In Other News: N8n Flaw Exploited, Slopoly Malware, Interpol Cybercrime Crackdown

Other noteworthy stories that might have slipped under the radar: Telus Digital data breach, vulnerabilities in Linux AppArmor allow root privileges, US defense contractor behind Coruna exploits.

SecurityWeekMar 13, 20265m8
Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
The Hacker News
Industry News

Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

Storm-2561 spreads fake VPN installers via SEO poisoning and GitHub downloads, stealing enterprise VPN credentials with Hyrax malware.

The Hacker NewsMar 13, 20263m11
Investigating a New Click-Fix Variant
The Hacker News
Industry News

Investigating a New Click-Fix Variant

New ClickFix variant maps WebDAV drive to run trojanized WorkFlowy app, enabling stealth C2 beacon and payload delivery.

The Hacker NewsMar 13, 20268m11
Industry News

Most Google Cloud Attacks Start With Bug Exploitation

Dark Reading
Industry News

Most Google Cloud Attacks Start With Bug Exploitation

Forget stolen credentials and misconfigurations; AI means vulnerability exploits that beat patching cycles are the top cause of compromises in the cloud.

Dark ReadingMar 13, 20261m9
Industry News

Real-Time Banking Trojan Strikes Brazil's Pix Users

Dark Reading
Industry News

Real-Time Banking Trojan Strikes Brazil's Pix Users

The latest banking Trojan campaign to hit Brazil combines classic malware with a real-time human operator, waiting for the perfect moment to strike.

Dark ReadingMar 13, 20261m9
Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War
SecurityWeek
Industry News

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are targeting sites in the Middle East and starting to stretch into the United States during the war, raising the risk of American defense contractors, power stations and water plants.

SecurityWeekMar 13, 20266m9
Bold Security Emerges From Stealth With $40 Million in Funding
SecurityWeek
Industry News

Bold Security Emerges From Stealth With $40 Million in Funding

The startup relies on AI to turn devices into active agents that understand users’ actions and provide protection in real time.

SecurityWeekMar 13, 20262m9
Google Paid Out $17 Million in Bug Bounty Rewards in 2025
SecurityWeek
Industry News

Google Paid Out $17 Million in Bug Bounty Rewards in 2025

Google paid over $3.7 million for Chrome vulnerabilities, and more than $3.5 million for cloud security defects.

SecurityWeekMar 13, 20263m9
Iran-Linked Hacker Attack on Stryker Disrupted Manufacturing and Shipping
SecurityWeek
Industry News

Iran-Linked Hacker Attack on Stryker Disrupted Manufacturing and Shipping

Evidence indicates that the attackers leveraged existing endpoint management software rather than malware to wipe devices.

SecurityWeekMar 13, 20263m9