Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
The Hacker News
Industry News

Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

VOID#GEIST malware campaign delivers XWorm, AsyncRAT, and Xeno RAT using batch scripts, Python loaders, and explorer.exe injection.

The Hacker NewsMar 6, 20265m11
Industry News

Iran's Cyber-Kinetic War Doctrine Takes Shape

Dark Reading
Industry News

Iran's Cyber-Kinetic War Doctrine Takes Shape

Iran has been hacking IP cameras to plan missile strikes against its enemies, and mounting other attacks on physical assets, showing how cyber and kinetic warfare are fast becoming one and the same.

Dark ReadingMar 6, 20261m11
Industry News

Cyberattack on Mexico's Gov't Agencies Highlight AI Threat

Dark Reading
Industry News

Cyberattack on Mexico's Gov't Agencies Highlight AI Threat

Using Anthropic's Claude, OpenAI's ChatGPT, and a detailed playbook prompt, a handful of cyberattackers reportedly gained access to government agencies and its citizens' data.

Dark ReadingMar 6, 20261m11
The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity
The Hacker News
Industry News

The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity

AI-powered risk management helps MSPs automate assessments, manage compliance, and scale cybersecurity services with recurring revenue.

The Hacker NewsMar 6, 20265m11
Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
The Hacker News
Industry News

Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

Iran-linked MuddyWater hackers breached U.S. networks with new Dindoor malware as regional cyber attacks escalate amid Middle East conflict.

The Hacker NewsMar 6, 20266m13
China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks
The Hacker News
Critical
Industry News
91/10

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

China-linked UAT-9244 targets South American telecom networks with TernDoor, PeerTime, and BruteEntry malware on Windows, Linux, and edge devices.

UAT-9244 (FamousSparrow / Salt Typhoon affiliated)TelecommunicationsCritical Infrastructure
The Hacker NewsMar 6, 20264m11
Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
The Hacker News
Industry News

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

Microsoft reveals ClickFix campaign abusing Windows Terminal to deliver Lumma Stealer and steal browser credentials.

The Hacker NewsMar 6, 20263m11
Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog
The Hacker News
Industry News

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

CISA adds Hikvision flaw CVE-2017-7921 and Rockwell Automation CVE-2021-22681 to KEV, urging agencies to patch by March 26, 2026.

The Hacker NewsMar 6, 20262m12
Industry News

Nation-State Actor Embraces AI Malware Assembly Line

Dark Reading
Industry News

Nation-State Actor Embraces AI Malware Assembly Line

Pakistan's APT36 threat group has begun using vibe-coding to churn out mediocre malware, but at a scale that could overwhelm defenses.

Dark ReadingMar 5, 20261m11
Industry News

Tycoon 2FA Goes Boom as Europol, Vendors Bust Phishing Platform

Dark Reading
Industry News

Tycoon 2FA Goes Boom as Europol, Vendors Bust Phishing Platform

The phishing-as-a-service platform was popular among cyber threat actors because of its ability to bypass multifactor authentication defenses.

Dark ReadingMar 5, 20261m11
Industry News

Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

Dark Reading
Industry News

Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

Edge bugs are so fetch, and Cisco just patched 50 new ones, including some heavy hitters with 10 out of 10 scores on the CVSS scale.

Dark ReadingMar 5, 20261m11
Industry News

Fig Security Emerges From Stealth to Fix Broken Security Operations

Dark Reading
Info
Industry News
42/10

Fig Security Emerges From Stealth to Fix Broken Security Operations

Fig Security's platform traces security data flows end-to-end across SIEMs, pipelines, and response systems to alert teams before infrastructure changes break critical defenses.

TechnologyFinancial Services
Dark ReadingMar 5, 20261m11