Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Drift loses $280 million North Korean hackers seize Security Council powers
BleepingComputer
Malware & Threats

Drift loses $280 million North Korean hackers seize Security Council powers

The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation.

BleepingComputerApr 2, 20262m5
Residential proxies evaded IP reputation checks in 78% of 4B sessions
BleepingComputer
Malware & Threats

Residential proxies evaded IP reputation checks in 78% of 4B sessions

Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users.

BleepingComputerApr 2, 20263m5
Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime
BleepingComputer
Malware & Threats

Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime

Threat actors are exploiting vacant homes as "drop addresses" to intercept mail and enable fraud. Flare shows how postal services and fake identities are abused to turn mail into a fraud vector.

BleepingComputerApr 2, 20267m6
New Progress ShareFile flaws can be chained in pre-auth RCE attacks
BleepingComputer
Malware & Threats

New Progress ShareFile flaws can be chained in pre-auth RCE attacks

Two vulnerabilities in Progress ShareFile, an enterprise-grade secure file transfer solution, can be chained to enable unauthenticated file exfiltration from affected environments.

BleepingComputerApr 2, 20263m7
Medtech giant Stryker fully operational after data-wiping attack
BleepingComputer
Malware & Threats

Medtech giant Stryker fully operational after data-wiping attack

Stryker Corporation, one of the world's leading medical technology companies, says it's fully operational three weeks after many of its systems were wiped out in a cyberattack claimed by the Iranian-linked Handala hacktivist group.

BleepingComputerApr 2, 20263m6
Critical Cisco IMC auth bypass gives attackers Admin access
BleepingComputer
Malware & Threats

Critical Cisco IMC auth bypass gives attackers Admin access

Cisco has patched several critical and high-severity vulnerabilities, including an Integrated Management Controller (IMC) authentication bypass that enables attackers to gain Admin access.

BleepingComputerApr 2, 20262m5
Microsoft links Classic Outlook issue to email delivery problems
BleepingComputer
Malware & Threats

Microsoft links Classic Outlook issue to email delivery problems

Microsoft is investigating a known issue that prevents some Classic Outlook users from sending emails via Outlook.com.

BleepingComputerApr 2, 20262m6
Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks
BleepingComputer
Malware & Threats

Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks

Internet security watchdog Shadowserver has found over 14,000 BIG-IP APM instances exposed online amid ongoing attacks exploiting a critical-severity remote code execution (RCE) vulnerability.

BleepingComputerApr 2, 20263m6
New CrystalRAT malware adds RAT, stealer and prankware features
BleepingComputer
Malware & Threats

New CrystalRAT malware adds RAT, stealer and prankware features

A new malware-as-a-service called CrystalRAT is being promoted on Telegram, offering remote access, data theft, keylogging, and clipboard hijacking capabilities.

BleepingComputerApr 1, 20263m6
Apple expands iOS 18 updates to more iPhones to block DarkSword attacks
BleepingComputer
Malware & Threats

Apple expands iOS 18 updates to more iPhones to block DarkSword attacks

Apple has now made it possible for more iPhones still running iOS 18 to receive security updates that protect against the actively exploited DarkSword exploit kit.

BleepingComputerApr 1, 20263m6
Hackers exploit TrueConf zero-day to push malicious software updates
BleepingComputer
Malware & Threats

Hackers exploit TrueConf zero-day to push malicious software updates

Hackers have targeted TrueConf conference servers in attacks that exploit a zero-day vulnerability, allowing them to execute arbitrary files on all connected endpoints.

BleepingComputerApr 1, 20263m6
New EvilTokens service fuels Microsoft device code phishing attacks
BleepingComputer
Malware & Threats

New EvilTokens service fuels Microsoft device code phishing attacks

A new malicious kit called EvilTokens integrates device code phishing capabilities, allowing attackers to hijack Microsoft accounts and provide advanced features for business email compromise attacks.

BleepingComputerApr 1, 20263m6