Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Cisco Patches High-Severity IOS XR Vulnerabilities
SecurityWeek
Industry News

Cisco Patches High-Severity IOS XR Vulnerabilities

The security defects could lead to denial-of-service (DoS) conditions, command execution, or device takeover.

SecurityWeekMar 12, 20262m8
Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit
The Hacker News
Industry News

Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

Apple backports CVE-2023-43010 WebKit fix after Coruna exploit kit abused iOS flaws, protecting older iPhones and iPads from memory corruption attacks

The Hacker NewsMar 12, 20264m8
Critical N8n Vulnerabilities Allowed Server Takeover
SecurityWeek
Industry News

Critical N8n Vulnerabilities Allowed Server Takeover

The bugs allowed unauthenticated attackers to execute arbitrary code, steal credentials, and take over servers.

SecurityWeekMar 12, 20262m8
Polyfill Supply Chain Attack Impacting 100k Sites Linked to North Korea
SecurityWeek
Industry News

Polyfill Supply Chain Attack Impacting 100k Sites Linked to North Korea

The 2024 incident was initially linked to China, but an infostealer infection has now revealed North Korean involvement.

SecurityWeekMar 12, 20263m8
Industry News

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

The Hacker News
Industry News

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

Cybersecurity researchers have discovered half-a-dozen new Android malware families that come with capabilities to steal data from compromised devices and conduct financial fraud. The Android malware range from traditional banking trojans like PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, and Ob...

The Hacker NewsMar 12, 20261m8
CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed
The Hacker News
Industry News

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

CISA adds n8n RCE flaw CVE-2025-68613 to KEV after active exploitation; 24,700 exposed instances raise compromise risk.

The Hacker NewsMar 12, 20262m8
Smashing Security podcast #458: How not to steal $46 million from the US government
Graham Cluley
Industry News

Smashing Security podcast #458: How not to steal $46 million from the US government

A Wikipedia security engineer accidentally wakes a dormant JavaScript worm that hadn’t stirred since 2024 – and within minutes, giant woodpecker images are…

Graham CluleyMar 12, 20262m8
Industry News

A Guy Who Wrote the Code Died in 2005. I Still Have to Secure It

Dark Reading
Industry News

A Guy Who Wrote the Code Died in 2005. I Still Have to Secure It

The real frontline of American cybersecurity is a bidding war on eBay for 30-year-old industrial controllers.

Dark ReadingMar 11, 20261m6
Industry News

INC Ransomware Group Holds Healthcare Hostage in Oceania

Dark Reading
Critical
Industry News
88/10

INC Ransomware Group Holds Healthcare Hostage in Oceania

Government agencies, emergency clinics, and others in Australia, New Zealand, and Tonga have had serious run-ins with the prolific ransomware outfit.

INC Ransomware GroupHealthcareGovernment
Dark ReadingMar 11, 20261m8
Industry News

Xygeni GitHub Action Compromised Via Tag Poison

Dark Reading
Industry News

Xygeni GitHub Action Compromised Via Tag Poison

Attackers operated an active C2 implant for up to a week and compromised AppSec vendor Xygeni's xygeni/xygeni-action in that time.

Dark ReadingMar 11, 20261m8
Senate Confirms Joshua Rudd to Lead NSA and US Cyber Command
SecurityWeek
Industry News

Senate Confirms Joshua Rudd to Lead NSA and US Cyber Command

The leadership structure, commonly referred to as the “dual-hat” arrangement, assigns a single individual to oversee both organizations.

SecurityWeekMar 11, 20264m8
Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes
The Hacker News
Industry News

Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes

Researchers show GAN-trained phishing pages can trick Perplexity’s Comet AI browser in under four minutes, exposing a new AI-targeted attack surface.

The Hacker NewsMar 11, 20264m8