Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

New Bluekit phishing service includes an AI assistant, 40 templates
BleepingComputer
Malware & Threats

New Bluekit phishing service includes an AI assistant, 40 templates

A new phishing kit named Bluekit offers more than 40 templates targeting popular services and includes basic AI features for generating campaign drafts.

BleepingComputerApr 30, 20263m4
Romanian leader of online swatting ring gets 4 years in prison
BleepingComputer
Malware & Threats

Romanian leader of online swatting ring gets 4 years in prison

A Romanian national who led an online swatting ring that targeted more than 75 public officials, multiple journalists, and four religious institutions was sentenced to 4 years in federal prison.

BleepingComputerApr 30, 20263m4
FBI links cybercriminals to sharp surge in cargo theft attacks
BleepingComputer
Malware & Threats

FBI links cybercriminals to sharp surge in cargo theft attacks

The U.S. Federal Bureau of Investigation (FBI) warned the transportation and logistics industry of a sharp rise in cyber-enabled cargo theft, with estimated losses in the United States and Canada reaching nearly $725 million in 2025.

BleepingComputerApr 30, 20263m4
April KB5083769 Windows 11 update causes backup software failures
BleepingComputer
Malware & Threats

April KB5083769 Windows 11 update causes backup software failures

The April 2026 KB5083769 security update breaks third-party backup applications from multiple vendors on systems running Windows 11 24H2 and 25H2.

BleepingComputerApr 30, 20262m4
What Happens in the First 24 Hours After a New Asset Goes Live
BleepingComputer
Malware & Threats

What Happens in the First 24 Hours After a New Asset Goes Live

When a new asset goes live, attackers start scanning within minutes. Sprocket Security shows how automated attacks move from discovery to compromise in under 24 hours.

BleepingComputerApr 30, 20265m3
New Linux ‘Copy Fail’ flaw gives hackers root on major distros
BleepingComputer
Malware & Threats

New Linux ‘Copy Fail’ flaw gives hackers root on major distros

An exploit has been published for a local privilege escalation vulnerability dubbed "Copy Fail" that impacts Linux kernels released since 2017, allowing an unprivileged local attacker to gain root permissions.

BleepingComputerApr 30, 20264m2
Critical cPanel and WHM bug exploited as a zero-day, PoC now available
BleepingComputer
Malware & Threats

Critical cPanel and WHM bug exploited as a zero-day, PoC now available

The critical CVE-2026-41940 authentication bypass vulnerability in cPanel, WHM, and WP Squared is being actively exploited in the wild and has been leveraged in attempts since late February.

BleepingComputerApr 30, 20263m2
Police dismantles 9 crypto scam centers, arrests 276 suspects
BleepingComputer
Malware & Threats

Police dismantles 9 crypto scam centers, arrests 276 suspects

A joint international operation involving U.S. and Chinese authorities arrested at least 276 suspects and shut down nine cryptocurrency investment fraud centers.

BleepingComputerApr 30, 20263m2
Official SAP npm packages compromised to steal credentials
BleepingComputer
Malware & Threats

Official SAP npm packages compromised to steal credentials

Multiple official SAP npm packages were compromised in what is believed to be a TeamPCP supply-chain attack to steal credentials and authentication tokens from developers' systems.

BleepingComputerApr 29, 20263m2
Popular WordPress redirect plugin hid dormant backdoor for years
BleepingComputer
Malware & Threats

Popular WordPress redirect plugin hid dormant backdoor for years

The Quick Page/Post Redirect plugin, installed on more than 70,000 WordPress sites, had a backdoor added five years ago that allows injecting arbitrary code into users' sites.

BleepingComputerApr 29, 20263m2
Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining
BleepingComputer
Malware & Threats

Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining

Hackers are exploiting two authentication bypass vulnerabilities in the Qinglong open-source task scheduling tool to deploy cryptominers on developers' servers.

BleepingComputerApr 29, 20263m2
Hackers arrested for hijacking and selling 610,000 Roblox accounts
BleepingComputer
Malware & Threats

Hackers arrested for hijacking and selling 610,000 Roblox accounts

The Ukrainian police have arrested three individuals who hacked more than 610,000 Roblox gaming accounts and sold them for a profit of $225,000.

BleepingComputerApr 29, 20263m2