Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Fake Claude AI website delivers new 'Beagle' Windows malware
BleepingComputer
Malware & Threats

Fake Claude AI website delivers new 'Beagle' Windows malware

A fake version for the Claude AI website offers a malicious Claude-Pro Relay download that pushes a previously undocumented backdoor for Windows named Beagle.

BleepingComputer23h ago4m3
Hackers abuse Google ads for GoDaddy ManageWP login phishing
BleepingComputer
Malware & Threats

Hackers abuse Google ads for GoDaddy ManageWP login phishing

A phishing campaign delivered through Google sponsored search results is targeting credentials for ManageWP, GoDaddy's platform for managing fleets of WordPress websites.

BleepingComputer1d ago3m2
Critical vm2 sandbox bug lets attackers execute code on hosts
BleepingComputer
Malware & Threats

Critical vm2 sandbox bug lets attackers execute code on hosts

A critical vulnerability in the popular Node.js sandboxing library vm2 allows escaping the sandbox and executing arbitrary code on the host system.

BleepingComputer1d ago3m2
New Cisco DoS flaw requires manual reboot to revive devices
BleepingComputer
Malware & Threats

New Cisco DoS flaw requires manual reboot to revive devices

Cisco patched a Crosswork Network Controller and Network Services Orchestrator denial-of-service vulnerability that requires manually rebooting targeted systems for recovery.

BleepingComputer1d ago3m2
DAEMON Tools devs confirm breach, release malware-free version
BleepingComputer
Malware & Threats

DAEMON Tools devs confirm breach, release malware-free version

Disc Soft Limited, the maker of DAEMON Tools Lite, confirmed that the software had been trojanized in a supply chain attack and released a new, malware-free version.

BleepingComputer1d ago3m2
Why ransomware attacks succeed even when backups exist
BleepingComputer
Malware & Threats

Why ransomware attacks succeed even when backups exist

Backups don't fail because they're missing, they fail because attackers destroy them first. Acronis explains how ransomware targets backup systems before encryption, leaving no path to recovery.

BleepingComputer1d ago6m2
MuddyWater hackers use Chaos ransomware as a decoy in attacks
BleepingComputer
Malware & Threats

MuddyWater hackers use Chaos ransomware as a decoy in attacks

The MuddyWater Iranian hackers disguised their operations as a Chaos ransomware attack, relying on  Microsoft Teams social engineering to gain access and establish persistence.

BleepingComputer1d ago3m3
Webinar: Why network incidents escalate and how to fix response gaps
BleepingComputer
Malware & Threats

Webinar: Why network incidents escalate and how to fix response gaps

Most network incidents don't escalate due to a lack of alerts; they escalate when response breaks down. This webinar explores how to fix gaps in triage, enrichment, and coordination.

BleepingComputer1d ago2m3
Palo Alto Networks warns of firewall RCE zero-day exploited in attacks
BleepingComputer
Malware & Threats

Palo Alto Networks warns of firewall RCE zero-day exploited in attacks

Palo Alto Networks warned customers today that a critical-severity unpatched vulnerability in the PAN-OS User-ID Authentication Portal is being exploited in attacks.

BleepingComputer2d ago3m3
New stealthy Quasar Linux malware targets software developers
BleepingComputer
Malware & Threats

New stealthy Quasar Linux malware targets software developers

A previously undocumented Linux implant named Quasar Linux (QLNX) is targeting developers' systems with a mix of rootkit, backdoor, and credential-stealing capabilities.

BleepingComputer2d ago3m2
Instructure hacker claims data theft from 8,800 schools, universities
BleepingComputer
Malware & Threats

Instructure hacker claims data theft from 8,800 schools, universities

The hacker behind a breach at education technology giant Instructure claims to have stolen 280 million data records for students and staff from 8,809 colleges, school districts, and online education platforms.

BleepingComputer2d ago3m2
DAEMON Tools trojanized in supply-chain attack to deploy backdoor
BleepingComputer
Malware & Threats

DAEMON Tools trojanized in supply-chain attack to deploy backdoor

Hackers trojanized installers for the DAEMON Tools software and since April 8, delivered a backdoor to thousands of systems that downloaded the product from the official website.

BleepingComputer2d ago3m3