Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
The Hacker News
Industry News

INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime

INTERPOL dismantled 45,000 malicious IPs in Operation Synergia across 72 countries, disrupting global phishing and ransomware networks.

The Hacker NewsMar 13, 20264m10
In Other News: N8n Flaw Exploited, Slopoly Malware, Interpol Cybercrime Crackdown
SecurityWeek
Industry News

In Other News: N8n Flaw Exploited, Slopoly Malware, Interpol Cybercrime Crackdown

Other noteworthy stories that might have slipped under the radar: Telus Digital data breach, vulnerabilities in Linux AppArmor allow root privileges, US defense contractor behind Coruna exploits.

SecurityWeekMar 13, 20265m8
From VMware to what’s next: Protecting data during hypervisor migration
BleepingComputer
Malware & Threats

From VMware to what’s next: Protecting data during hypervisor migration

Hypervisor migrations can introduce hidden risks that threaten data availability and recovery. Acronis explains why verified backups and cross-platform recovery are essential during VMware transitions.

BleepingComputerMar 13, 20266m11
Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
The Hacker News
Industry News

Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

Storm-2561 spreads fake VPN installers via SEO poisoning and GitHub downloads, stealing enterprise VPN credentials with Hyrax malware.

The Hacker NewsMar 13, 20263m11
Police sinkholes 45,000 IP addresses in cybercrime crackdown
BleepingComputer
Malware & Threats

Police sinkholes 45,000 IP addresses in cybercrime crackdown

An international law enforcement action codenamed "Operation Synergia III" has sinkholed tens of thousands of IP addresses and seized servers linked to cybercrime operations worldwide.

BleepingComputerMar 13, 20263m11
Investigating a New Click-Fix Variant
The Hacker News
Industry News

Investigating a New Click-Fix Variant

New ClickFix variant maps WebDAV drive to run trojanized WorkFlowy app, enabling stealth C2 beacon and payload delivery.

The Hacker NewsMar 13, 20268m11
Fake enterprise VPN downloads used to steal company credentials
BleepingComputer
Malware & Threats

Fake enterprise VPN downloads used to steal company credentials

A threat actor tracked as Storm-2561 is distributing fake enterprise VPN clients from Ivanti, Cisco, and Fortinet to steal VPN credentials from unsuspecting users.

BleepingComputerMar 13, 20262m11
Industry News

Most Google Cloud Attacks Start With Bug Exploitation

Dark Reading
Industry News

Most Google Cloud Attacks Start With Bug Exploitation

Forget stolen credentials and misconfigurations; AI means vulnerability exploits that beat patching cycles are the top cause of compromises in the cloud.

Dark ReadingMar 13, 20261m9
Industry News

Real-Time Banking Trojan Strikes Brazil's Pix Users

Dark Reading
Industry News

Real-Time Banking Trojan Strikes Brazil's Pix Users

The latest banking Trojan campaign to hit Brazil combines classic malware with a real-time human operator, waiting for the perfect moment to strike.

Dark ReadingMar 13, 20261m9
Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War
SecurityWeek
Industry News

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are targeting sites in the Middle East and starting to stretch into the United States during the war, raising the risk of American defense contractors, power stations and water plants.

SecurityWeekMar 13, 20266m9
Vulnerabilities

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA Alerts
Vulnerabilities

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsMar 13, 20261m9
Bold Security Emerges From Stealth With $40 Million in Funding
SecurityWeek
Industry News

Bold Security Emerges From Stealth With $40 Million in Funding

The startup relies on AI to turn devices into active agents that understand users’ actions and provide protection in real time.

SecurityWeekMar 13, 20262m9