Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Incomplete Windows Patch Opens Door to Zero-Click Attacks
SecurityWeek
Industry News

Incomplete Windows Patch Opens Door to Zero-Click Attacks

The initial vulnerability was exploited by Russia-linked APT28 in attacks against Ukraine and EU countries.

SecurityWeekApr 27, 20263m4
Money launderer linked to $230M crypto heist gets 70 months in prison
BleepingComputer
Malware & Threats

Money launderer linked to $230M crypto heist gets 70 months in prison

​22-year-old Evan Tangeman of Newport Beach, California, was sentenced to 70 months in prison for laundering funds stolen in a massive $230 million cryptocurrency heist.

BleepingComputerApr 27, 20263m4
Deepfake Voice Attacks are Outpacing Defenses: What Security Leaders Should Know
BleepingComputer
Malware & Threats

Deepfake Voice Attacks are Outpacing Defenses: What Security Leaders Should Know

Three seconds of audio is all it takes to clone a voice for fraud. Adaptive Security shows how deepfake calls trick employees into sending real money—and why most defenses don't catch them.

BleepingComputerApr 27, 20266m4
Industry News

Parsing Agentic Offensive Security's Existential Threat

Dark Reading
Industry News

Parsing Agentic Offensive Security's Existential Threat

Some fear frontier LLMs like Claude Mythos and Anthropic's GPT-5.5 will lead to cybersecurity annihilation. Ari Herbert-Voss notes this could be an opportunity.

Dark ReadingApr 27, 20261m4
OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years
SecurityWeek
Industry News

OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years

A code reuse issue enabled comma characters in certificate principals to be interpreted as list separators.

SecurityWeekApr 27, 20263m4
Malicious AI Prompt Injection Attacks Increasing, but Sophistication Still Low: Google
SecurityWeek
Industry News

Malicious AI Prompt Injection Attacks Increasing, but Sophistication Still Low: Google

The tech giant found that many indirect prompt injection attempts are harmless, but some malicious exploits have also been identified.

SecurityWeekApr 27, 20263m4
Microsoft says Outlook.com outage is causing sign‑in failures
BleepingComputer
Malware & Threats

Microsoft says Outlook.com outage is causing sign‑in failures

Microsoft is investigating an ongoing Outlook.com outage that is causing intermittent signing issues and preventing customers from accessing their mailboxes.

BleepingComputerApr 27, 20262m4
Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side
The Hacker News
Industry News

Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side

Claude Mythos’ April 7 launch accelerates vulnerability discovery, but limited access and rising false positives strain remediation workflows.

The Hacker NewsApr 27, 20266m4
PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks
The Hacker News
Industry News

PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks

PhantomCore exploited three TrueConf flaws since September 2025, enabling remote access and lateral movement across Russian networks.

The Hacker NewsApr 27, 20267m4
Industry News

Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware

The Hacker News
Industry News

Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware

Cybersecurity researchers have flagged dozens of Microsoft Visual Studio Code (VS Code) extensions on the Open VSX repository that are linked to a persistent information-stealing campaign dubbed GlassWorm. The cluster of 73 extensions has been identified as cloned versions of their legitimate cou...

The Hacker NewsApr 27, 20261m4
Energy and Water Management Firm Itron Hacked
SecurityWeek
Industry News

Energy and Water Management Firm Itron Hacked

Itron, which serves utilities and cities around the world, discovered unauthorized access to its systems on April 13.

SecurityWeekApr 27, 20262m4
UNC6692 Uses Email Bombing, Social Engineering to Deploy ‘Snow’ Malware
SecurityWeek
Industry News

UNC6692 Uses Email Bombing, Social Engineering to Deploy ‘Snow’ Malware

The threat actor infected victims with the Snow malware family – Snowbelt, Snowglaze, and Snowbasin – for persistent access.

SecurityWeekApr 27, 20264m4