Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
The Hacker News
Industry News

ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

Latest cybersecurity threats, malware campaigns, research findings, and key security developments from this week’s ThreatsDay Bulletin.

The Hacker News5d ago13m1
Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
The Hacker News
Industry News

Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

Iran-linked Dust Specter targeted Iraqi officials using fake ministry lures and new malware families uncovered by Zscaler.

The Hacker News5d ago4m1
Vulnerabilities

CISA Adds Five Known Exploited Vulnerabilities to Catalog

CISA Alerts
Vulnerabilities

CISA Adds Five Known Exploited Vulnerabilities to Catalog

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA Alerts5d ago1m2
Vulnerabilities

Delta Electronics CNCSoft-G2

CISA Alerts
Vulnerabilities

Delta Electronics CNCSoft-G2

View CSAF

CISA Alerts5d ago3m1
Vulnerabilities

ISC Stormcast For Thursday, March 5th, 2026 https://isc.sans.edu/podcastdetail/9836, (Thu, Mar 5th)

SANS ISC
Vulnerabilities

ISC Stormcast For Thursday, March 5th, 2026 https://isc.sans.edu/podcastdetail/9836, (Thu, Mar 5th)

No description available.

SANS ISC5d ago1m1
Where Multi-Factor Authentication Stops and Credential Abuse Starts
The Hacker News
Industry News

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Seven Windows authentication paths bypass MFA protections, enabling credential attacks through AD, NTLM, Kerberos, RDP, SMB, and service accounts.

The Hacker News5d ago6m1
APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
The Hacker News
Industry News

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

Researchers uncover APT28-linked phishing attacks against Ukrainian targets deploying BadPaw loader and MeowMeow backdoor for remote system control.

The Hacker News5d ago4m1
Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
The Hacker News
Industry News

Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

Authorities dismantle Tycoon 2FA phishing service linked to 64,000 attacks, millions of emails, and breaches at nearly 100,000 organizations worldwide

The Hacker News5d ago5m1
FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials
The Hacker News
Industry News

FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials

Authorities dismantled LeakBase, a cybercrime forum with 142,000 members trading stolen credentials and financial data in a global crackdown.

The Hacker News5d ago3m1
Vulnerabilities

Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning [Guest Diary], (Wed, Mar 4th)

SANS ISC
Vulnerabilities

Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning [Guest Diary], (Wed, Mar 4th)

[This is a Guest Diary by Joseph Gruen, an ISC intern as part of the SANS.edu BACS program]

SANS ISC5d ago1m1
Smashing Security podcast #457: How a cybersecurity boss framed his own employee
Graham Cluley
Industry News

Smashing Security podcast #457: How a cybersecurity boss framed his own employee

When a top cybersecurity firm discovered it had a leak, you would expect the FBI to be called. Instead, the person put in charge of the investigation was the…

Graham Cluley5d ago3m1
Industry News

VMware Aria Operations Bug Exploited, Cloud Resources at Risk

Dark Reading
Industry News

VMware Aria Operations Bug Exploited, Cloud Resources at Risk

Exploitation of the command injection flaw in VMware Aria Operations could grant an attacker broad acess to victims' cloud environments.

Dark Reading6d ago1m1