Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Who is the Kimwolf Botmaster “Dort”?
Krebs on Security
Data Breaches

Who is the Kimwolf Botmaster “Dort”?

In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botnet. Since then, the person in control of Kimwolf -- who goes by the handle…

Krebs on SecurityFeb 28, 20267m10
Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement
The Hacker News
Industry News

Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement

Research reveals 2,863 public Google API keys can access Gemini endpoints, enabling data exposure and massive billing abuse.

The Hacker NewsFeb 28, 20264m9
Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute
The Hacker News
Industry News

Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute

Pentagon labels Anthropic a supply chain risk after dispute over mass surveillance and autonomous weapons use.

The Hacker NewsFeb 28, 20268m9
Industry News

Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL

Dark Reading
Industry News

Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL

HBO's "The Pitt" is showing audiences what a real Mississippi healthcare system is going through this week, thanks to a ransomware attack.

Dark ReadingFeb 27, 20261m9
Industry News

Cities Hosting Major Events Need More Focus on Wireless, Drone Defense

Dark Reading
Industry News

Cities Hosting Major Events Need More Focus on Wireless, Drone Defense

Major events like the FIFA World Cup need to look beyond traditional physical and cyber security to active and passive wireless threats, say experts.

Dark ReadingFeb 27, 20261m9
Industry News

Flaw-Finding AI Assistants Face Criticism for Speed, Accuracy

Dark Reading
Industry News

Flaw-Finding AI Assistants Face Criticism for Speed, Accuracy

Using AI to find security vulnerabilities holds significant promise, but the initial products fall short of the needs of enterprises and software developers, say experts.

Dark ReadingFeb 27, 20261m9
DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams
The Hacker News
Industry News

DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams

The U.S. DoJ seized $61 million in Tether tied to pig butchering crypto investment scams, while Tether reports freezing $4.2 billion in illicit assets

The Hacker NewsFeb 27, 20262m9
900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
The Hacker News
Critical
Industry News
82/10

900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

Over 900 FreePBX systems remain infected after CVE-2025-64328 exploitation, now listed in CISA KEV amid active attacks.

INJ3CTOR3TelecommunicationsTechnology
The Hacker NewsFeb 27, 20263m9
Industry News

The Case for Why Better Breach Transparency Matters

Dark Reading
Industry News

The Case for Why Better Breach Transparency Matters

It's become a standard practice for organizations to disclose the bare minimum about a data breach, or worse — not disclose the incident at all.

Dark ReadingFeb 27, 20261m9
Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor
The Hacker News
Industry News

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

A fake Go module posing as golang.org/x/crypto captures terminal passwords, installs SSH persistence, and delivers the Rekoobe Linux backdoor.

The Hacker NewsFeb 27, 20263m9
Industry News

Claude Code Security Shows Promise, Not Perfection

Dark Reading
Industry News

Claude Code Security Shows Promise, Not Perfection

Claude Code's introduction rippled across the stock market, but researchers and analysts say its impact was overstated, as they peel back the layers.

Dark ReadingFeb 27, 20261m9
ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
The Hacker News
Industry News

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

North Korea-linked ScarCruft’s Ruby Jumper uses Zoho WorkDrive C2 and USB malware to breach air-gapped systems for surveillance.

The Hacker NewsFeb 27, 20264m9