Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
The Hacker News
Industry News

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

Malicious Packagist Laravel packages install a cross-platform RAT enabling remote shell access and system reconnaissance via C2 server.

The Hacker NewsMar 4, 20263m11
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
The Hacker News
Industry News

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

Researchers link Silver Dragon APT to APT41 after attacks on government entities using Cobalt Strike, DNS tunneling, and Google Drive-based C2.

The Hacker NewsMar 4, 20265m11
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
The Hacker News
Industry News

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

CISA adds VMware Aria Operations command injection flaw CVE-2026-22719 to KEV after reports of active exploitation; patches released by Broadcom.

The Hacker NewsMar 4, 20262m11
Vulnerabilities

ISC Stormcast For Wednesday, March 4th, 2026 https://isc.sans.edu/podcastdetail/9834, (Wed, Mar 4th)

SANS ISC
Info
Vulnerabilities
10/10

ISC Stormcast For Wednesday, March 4th, 2026 https://isc.sans.edu/podcastdetail/9834, (Wed, Mar 4th)

No description available.

All SectorsInformation Technology
SANS ISCMar 4, 20261m11
Industry News

Indian APT 'Sloppy Lemming' Targets Defense, Critical Infrastructure

Dark Reading
Industry News

Indian APT 'Sloppy Lemming' Targets Defense, Critical Infrastructure

India-nexus cyber threat actors are growing more active and sophisticated, using custom tools coded in Rust and cloud-based command and control.

Dark ReadingMar 3, 20261m11
Industry News

Vehicle Tire Pressure Sensors Enable Silent Tracking

Dark Reading
Industry News

Vehicle Tire Pressure Sensors Enable Silent Tracking

Like many other features and systems in modern cars, tire pressure sensors leak sensitive data that can be abused by threat actors.

Dark ReadingMar 3, 20261m11
Industry News

Qualcomm Zero-Day Exploited in Targeted Android Attacks

Dark Reading
Industry News

Qualcomm Zero-Day Exploited in Targeted Android Attacks

The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups.

Dark ReadingMar 3, 20261m11
Industry News

Speakeasies to Shadow AI: Banning AI Browsers Will Fail

Dark Reading
Industry News

Speakeasies to Shadow AI: Banning AI Browsers Will Fail

Lessons from history highlight why AI-enabled browsers require controlled enablement.

Dark ReadingMar 3, 20261m11
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
The Hacker News
Industry News

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Fake IT support calls delivered Havoc C2, enabling credential theft, lateral movement, and ransomware prep across five organizations.

The Hacker NewsMar 3, 20264m11
They seized $4.8m in crypto… then gave the master key to the internet
Graham Cluley
Industry News

They seized $4.8m in crypto… then gave the master key to the internet

South Korea's National Tax Service (NTS) has found itself in the middle of a deeply embarrassing — and costly — blunder after accidentally handing thieves the master key to a seized cryptocurrency wallet.

Graham CluleyMar 3, 20264m11
Vulnerabilities

Bruteforce Scans for CrushFTP , (Tue, Mar 3rd)

SANS ISC
Vulnerabilities

Bruteforce Scans for CrushFTP , (Tue, Mar 3rd)

CrushFTP is a Java-based open source file transfer system. It is offered for multiple operating systems. If you run a CrushFTP instance, you may remember that the software has had some serious vulnerabilities: CVE-2024-4040 (the template-injection flaw that let unauthenticated attackers escape th...

SANS ISCMar 3, 20261m11
Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow
The Hacker News
Industry News

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

Tier 1 SOC analysts face overload and false positives; integrated threat intelligence and sandboxing reduce dwell time and improve detection.

The Hacker NewsMar 3, 202610m11