Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Industry News

Chinese Police Use ChatGPT to Smear Japan PM Takaichi

Dark Reading
Industry News

Chinese Police Use ChatGPT to Smear Japan PM Takaichi

A Chinese keyboard warrior inadvertently leaked information about politically motivated influence operations through a ChatGPT account.

Dark ReadingFeb 26, 20261m1
Industry News

Flaws in Claude Code Put Developers' Machines at Risk

Dark Reading
Industry News

Flaws in Claude Code Put Developers' Machines at Risk

The vulnerabilities highlight a big drawback to integrating AI into software development workflows and the potential impact on supply chains.

Dark ReadingFeb 25, 20261m1
Industry News

RAMP Forum Seizure Fractures Ransomware Ecosystem

Dark Reading
Industry News

RAMP Forum Seizure Fractures Ransomware Ecosystem

Researchers suggest defenders monitor how these malicious groups re-form and leverage the useful threat intel to guide their next moves.

Dark ReadingFeb 25, 20261m1
Industry News

PCI Council Says Threats to Payments Systems Are Speeding Up

Dark Reading
Industry News

PCI Council Says Threats to Payments Systems Are Speeding Up

The PCI Security Standards Council experienced a record year in many regards, but its first annual report shows it needs to work even faster to stay ahead of attackers.

Dark ReadingFeb 25, 20261m1
Industry News

Malicious Next.js Repos Target Developers Via Fake Job Interviews

Dark Reading
Industry News

Malicious Next.js Repos Target Developers Via Fake Job Interviews

Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent access to infected machines.

Dark ReadingFeb 25, 20261m1
Industry News

Why 'Call This Number' TOAD Emails Beat Gateways

Dark Reading
Industry News

Why 'Call This Number' TOAD Emails Beat Gateways

Attackers are bypassing email gateways through telephone-oriented attack delivery (TOAD), in which the only email payload is a phone number.

Dark ReadingFeb 25, 20261m1
Vulnerabilities

CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems

CISA Alerts
Vulnerabilities

CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems

As a result of the malicious cyber activity and vulnerabilities involving Cisco SD-WAN systems, CISA has outlined requirements for FCEB agencies in Emergency Directive (ED) 26-03 to inventory Cisco SD-WAN systems, update them, and assess compromise.

CISA AlertsFeb 25, 20263m1
Vulnerabilities

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA Alerts
Vulnerabilities

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsFeb 25, 20261m1
Industry News

'Richter Scale' Model Measures Magnitude of OT Cyber Incidents

Dark Reading
Industry News

'Richter Scale' Model Measures Magnitude of OT Cyber Incidents

ICS/OT experts have devised a scoring system for rating the severity and effects of cybersecurity events in operational technology environments.

Dark ReadingFeb 25, 20261m1
$10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon
Graham Cluley
Industry News

$10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon

Did you watch this year's Super Bowl? If you did, maybe you're one of those who were sat at your sofa fuming about Ring camera's TV ad.

Graham CluleyFeb 25, 20263m1
Industry News

Operation Red Card 2.0 Leads to 651 Arrests in Africa

Dark Reading
Industry News

Operation Red Card 2.0 Leads to 651 Arrests in Africa

In the latest operation targeting cybercrime groups, African law enforcement agencies cooperated with Interpol and cybersecurity firms to recover more than $4.3 million.

Dark ReadingFeb 25, 20261m1
Industry News

Attackers Now Need Just 29 Minutes to Own a Network

Dark Reading
Industry News

Attackers Now Need Just 29 Minutes to Own a Network

Credential misuse, AI tools, and security blind spots help attackers move through breached networks faster than ever, CrowdStrike finds.

Dark ReadingFeb 24, 20261m1