Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Industry News

New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

The Hacker News
Critical
Industry News
85/10

New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

Cybersecurity researchers have disclosed nine cross-tenant vulnerabilities in Google Looker Studio that could have permitted attackers to run arbitrary SQL queries on victims' databases and exfiltrate sensitive data within organizations' Google Cloud environments. The shortcomings have been colle...

TechnologyCloud Services
The Hacker NewsMar 10, 20261m10
Hundreds of Salesforce Customers Allegedly Targeted in New Data Theft Campaign
SecurityWeek
Industry News

Hundreds of Salesforce Customers Allegedly Targeted in New Data Theft Campaign

Salesforce has confirmed that customers are being targeted via poorly secured instances.

SecurityWeekMar 10, 20262m10
Vulnerabilities

Lantronix EDS3000PS and EDS5000

CISA Alerts
Vulnerabilities

Lantronix EDS3000PS and EDS5000

View CSAF

CISA AlertsMar 10, 20267m10
Vulnerabilities

Ceragon Siklu MultiHaul and EtherHaul Series

CISA Alerts
Vulnerabilities

Ceragon Siklu MultiHaul and EtherHaul Series

View CSAF

CISA AlertsMar 10, 20263m10
Vulnerabilities

Apeman Cameras

CISA Alerts
Vulnerabilities

Apeman Cameras

View CSAF

CISA AlertsMar 10, 20264m10
Vulnerabilities

Honeywell IQ4x BMS Controller

CISA Alerts
Vulnerabilities

Honeywell IQ4x BMS Controller

View CSAF

CISA AlertsMar 10, 20263m10
Escape Raises $18 Million to Automate Pentesting
SecurityWeek
Industry News

Escape Raises $18 Million to Automate Pentesting

The company will deepen its platform's AI agent capabilities and scale engineering and go-to-market teams.

SecurityWeekMar 10, 20262m10
Recent Ivanti Endpoint Manager Flaw Exploited in Attacks
SecurityWeek
Industry News

Recent Ivanti Endpoint Manager Flaw Exploited in Attacks

CISA has added the high-severity authentication bypass vulnerability to its KEV list, along with SolarWinds and Workspace One bugs.

SecurityWeekMar 10, 20262m10
How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows
The Hacker News
Industry News

How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

Learn to audit AI agents and stop data leaks. Join our webinar to find hidden risks and secure your modern agentic workflows.

The Hacker NewsMar 10, 20262m10
CISA: Recently patched Ivanti EPM flaw now actively exploited
BleepingComputer
High
Malware & Threats
78/10

CISA: Recently patched Ivanti EPM flaw now actively exploited

CISA flagged a high-severity Ivanti Endpoint Manager (EPM) vulnerability as actively exploited in attacks and ordered U.S. federal agencies to patch systems within three weeks.

GovernmentFederal Agencies
BleepingComputerMar 10, 20263m10
The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction
The Hacker News
Industry News

The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

Attack surface exposure leaves services reachable as exploits appear within 24–48 hours after disclosure, increasing breach risk.

The Hacker NewsMar 10, 20266m10
SIM Swaps Expose a Critical Flaw in Identity Security
SecurityWeek
Industry News

SIM Swaps Expose a Critical Flaw in Identity Security

SIM swap attacks exploit misplaced trust in phone numbers and human processes to bypass authentication controls and seize high-value accounts.

SecurityWeekMar 10, 20265m10