Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Industry News

Meta, TikTok Steal Users' Sensitive PII When They Click on Ads

Dark Reading
Industry News

Meta, TikTok Steal Users' Sensitive PII When They Click on Ads

Tracking pixels let social media companies spy on their own customers when they click over to advertiser sites, gleaning credit card info, currency type, and more.

Dark ReadingMar 18, 20261m5
Industry News

SideWinder Espionage Campaign Expands Across Southeast Asia

Dark Reading
Industry News

SideWinder Espionage Campaign Expands Across Southeast Asia

The suspected India-linked threat group targets governments, telecom, and critical infrastructure using spear-phishing, old vulnerabilities, and rapidly rotating infrastructure to maintain persistent access.

Dark ReadingMar 18, 20261m5
Iranian Hackers Likely Used Malware-Stolen Credentials in Stryker Breach
SecurityWeek
Industry News

Iranian Hackers Likely Used Malware-Stolen Credentials in Stryker Breach

The medtech giant has been working on restoring systems affected by the cyberattack conducted by the Handala hackers.

SecurityWeekMar 18, 20263m5
Apple Debuts Background Security Improvements With Fresh WebKit Patches
SecurityWeek
Industry News

Apple Debuts Background Security Improvements With Fresh WebKit Patches

The lightweight updates are meant to deliver security protections between security updates.

SecurityWeekMar 18, 20262m5
Vulnerabilities

CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization

CISA Alerts
Vulnerabilities

CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization

CISA is aware of malicious cyber activity targeting endpoint management systems of U.S. organizations based on the March 11, 2026 cyberattack against U.S.-based medical technology firm Stryker Corporation, which affected their Microsoft environment.1 To defend against similar malicious cyber acti...

CISA AlertsMar 18, 20263m5
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsMar 18, 20261m5
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsMar 18, 20261m5
Claude Code Security and Magecart: Getting the Threat Model Right
The Hacker News
Industry News

Claude Code Security and Magecart: Getting the Threat Model Right

Magecart hides payload in favicon EXIF via third-party scripts, bypassing static analysis and stealing checkout data at runtime.

The Hacker NewsMar 18, 20267m5
9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors
The Hacker News
Industry News

9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors

Researchers uncovered 9 vulnerabilities across 4 IP KVM devices enabling unauthenticated root access and code execution.

The Hacker NewsMar 18, 20264m5
Vulnerabilities

ISC Stormcast For Wednesday, March 18th, 2026 https://isc.sans.edu/podcastdetail/9854, (Wed, Mar 18th)

SANS ISC
Vulnerabilities

ISC Stormcast For Wednesday, March 18th, 2026 https://isc.sans.edu/podcastdetail/9854, (Wed, Mar 18th)

No description available.

SANS ISCMar 18, 20261m5
Researcher Discovers 4th WhatsApp View Once Bypass; Meta Won’t Patch
SecurityWeek
Industry News

Researcher Discovers 4th WhatsApp View Once Bypass; Meta Won’t Patch

Meta does not plan on fixing the vulnerability because it involves the use of a modified client application.

SecurityWeekMar 18, 20264m5
Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels
The Hacker News
Industry News

Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels

CSMA links siloed security tools into attack paths to crown jewels, exposing hidden risks and enabling faster remediation.

The Hacker NewsMar 18, 20268m5