Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Industry News

20 Years in Cyber: Dark Reading Marks Milestone With Month of Special Coverage

Dark Reading
Industry News

20 Years in Cyber: Dark Reading Marks Milestone With Month of Special Coverage

On this day in 2006, Dark Reading went live. We have a celebration planned that spans our two decades of covering the industry, and you, dear readers, are invited.

Dark ReadingMay 1, 20261m5
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsMay 1, 20261m4
Vulnerabilities

Careful Adoption of Agentic AI Services

CISA Alerts
Vulnerabilities

Careful Adoption of Agentic AI Services

This guidance discusses cybersecurity challenges and risks associated with the introduction of agentic AI into IT environments, as well as best practices for securing agentic AI systems.

CISA AlertsMay 1, 20261m5
Two US Security Experts Sentenced to Prison for Helping Ransomware Gang
SecurityWeek
Industry News

Two US Security Experts Sentenced to Prison for Helping Ransomware Gang

Ryan Goldberg of Georgia and Kevin Martin of Texas were each sentenced to four years in prison.

SecurityWeekMay 1, 20262m4
Microsoft now lets admins choose pre-installed Store apps to uninstall
BleepingComputer
Malware & Threats

Microsoft now lets admins choose pre-installed Store apps to uninstall

Microsoft has updated a Windows 11 in-box app removal policy introduced in October to include a dynamic list that lets IT admins choose which preinstalled Store apps to uninstall.

BleepingComputerMay 1, 20263m6
Sophisticated Deep#Door Backdoor Enables Espionage, Disruption
SecurityWeek
Industry News

Sophisticated Deep#Door Backdoor Enables Espionage, Disruption

The stealthy Python-based backdoor framework deploys a persistent Windows implant likely designed for espionage.

SecurityWeekMay 1, 20263m4
Top Five Sales Challenges Costing MSPs Cybersecurity Revenue
The Hacker News
Industry News

Top Five Sales Challenges Costing MSPs Cybersecurity Revenue

MSP sales gaps persist as 77% report low urgency and 66% SMBs cite cost, delaying cybersecurity adoption and revenue growth.

The Hacker NewsMay 1, 20266m4
Cisco Releases Open Source Tool for AI Model Provenance 
SecurityWeek
Industry News

Cisco Releases Open Source Tool for AI Model Provenance 

The new kit aims to address risks related to poisoned models, regulatory issues, supply chain integrity, and incident response.

SecurityWeekMay 1, 20263m4
Windows 11 KB5083631 update released with 34 changes and fixes
BleepingComputer
Malware & Threats

Windows 11 KB5083631 update released with 34 changes and fixes

Microsoft has released the KB5083631 optional cumulative update for Windows 11, which includes 34 changes, such as a new Xbox mode for Windows PCs, enhanced security and performance for batch files, and performance improvements for launching startup apps.

BleepingComputerMay 1, 20264m6
Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks
The Hacker News
Industry News

Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks

Two cybersecurity experts got 4-year sentences after enabling 2023 BlackCat attacks, exposing insider abuse and $1.2M ransom impact.

The Hacker NewsMay 1, 20262m4
Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
The Hacker News
Industry News

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

Sleeper packages in Ruby and Go steal credentials and alter CI workflows, leading to persistent access and data exfiltration.

The Hacker NewsMay 1, 20263m4
Hugging Face, ClawHub Abused for Malware Distribution
SecurityWeek
Industry News

Hugging Face, ClawHub Abused for Malware Distribution

Threat actors are relying on social engineering to lure users into downloading files containing malicious instructions.

SecurityWeekMay 1, 20263m4