Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Industry News

Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate

Dark Reading
Industry News

Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate

Dark Reading Confidential Episode 15: Interpol relied on Will Thomas and team to help break up a sprawling cybercrime ring, leading to the arrest of 574 suspects, the recovery of more than $3 million, and the decryption of six malware variants. Here's his story.

Dark ReadingMar 4, 20261m9
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
The Hacker News
Industry News

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

Google uncovered Coruna iOS exploit kit with 23 exploits across five chains targeting iPhones running iOS 13–17.2.1.

The Hacker NewsMar 4, 20266m10
New RFP Template for AI Usage Control and AI Governance 
The Hacker News
Industry News

New RFP Template for AI Usage Control and AI Governance 

New RFP guide helps CISOs evaluate AI governance tools, focusing on interaction-level security and vendor accountability.

The Hacker NewsMar 4, 20264m9
Industry News

China's Silver Dragon Razes Governments in EU, SE Asia

Dark Reading
Industry News

China's Silver Dragon Razes Governments in EU, SE Asia

The emerging actor, part of the APT41 nexus, gains initial access via phishing, and uses legitimate network services to obscure cyber espionage activities.

Dark ReadingMar 4, 20261m9
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
The Hacker News
Industry News

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

Malicious Packagist Laravel packages install a cross-platform RAT enabling remote shell access and system reconnaissance via C2 server.

The Hacker NewsMar 4, 20263m9
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
The Hacker News
Industry News

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

Researchers link Silver Dragon APT to APT41 after attacks on government entities using Cobalt Strike, DNS tunneling, and Google Drive-based C2.

The Hacker NewsMar 4, 20265m9
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
The Hacker News
Industry News

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

CISA adds VMware Aria Operations command injection flaw CVE-2026-22719 to KEV after reports of active exploitation; patches released by Broadcom.

The Hacker NewsMar 4, 20262m9
Industry News

Indian APT 'Sloppy Lemming' Targets Defense, Critical Infrastructure

Dark Reading
Industry News

Indian APT 'Sloppy Lemming' Targets Defense, Critical Infrastructure

India-nexus cyber threat actors are growing more active and sophisticated, using custom tools coded in Rust and cloud-based command and control.

Dark ReadingMar 3, 20261m9
Industry News

Vehicle Tire Pressure Sensors Enable Silent Tracking

Dark Reading
Industry News

Vehicle Tire Pressure Sensors Enable Silent Tracking

Like many other features and systems in modern cars, tire pressure sensors leak sensitive data that can be abused by threat actors.

Dark ReadingMar 3, 20261m9
Industry News

Qualcomm Zero-Day Exploited in Targeted Android Attacks

Dark Reading
Industry News

Qualcomm Zero-Day Exploited in Targeted Android Attacks

The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups.

Dark ReadingMar 3, 20261m9
Industry News

Speakeasies to Shadow AI: Banning AI Browsers Will Fail

Dark Reading
Industry News

Speakeasies to Shadow AI: Banning AI Browsers Will Fail

Lessons from history highlight why AI-enabled browsers require controlled enablement.

Dark ReadingMar 3, 20261m9
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
The Hacker News
Industry News

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Fake IT support calls delivered Havoc C2, enabling credential theft, lateral movement, and ransomware prep across five organizations.

The Hacker NewsMar 3, 20264m9