Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Vulnerabilities Patched in CrowdStrike, Tenable Products
SecurityWeek
Industry News

Vulnerabilities Patched in CrowdStrike, Tenable Products

CrowdStrike has fixed a critical LogScale vulnerability, while Tenable addressed a high-severity Nessus flaw.

SecurityWeekApr 24, 20262m4
Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2
The Hacker News
Industry News

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

Tropic Trooper used trojanized SumatraPDF and GitHub C2 in 2024 to deploy AdaptixC2, enabling covert VS Code tunnel access.

The Hacker NewsApr 24, 20263m4
Bitwarden NPM Package Hit in Supply Chain Attack
SecurityWeek
Industry News

Bitwarden NPM Package Hit in Supply Chain Attack

Tied to a fresh Checkmarx supply chain attack claimed by TeamPCP, the incident references the Shai-Hulud worm.

SecurityWeekApr 24, 20264m4
Copperhelm Raises $7 Million for Agentic Cloud Security Platform
SecurityWeek
Industry News

Copperhelm Raises $7 Million for Agentic Cloud Security Platform

The Israel-based company, which just emerged from stealth mode, was founded by cloud and security experts from RSA, McAfee, and Unity.

SecurityWeekApr 24, 20262m4
Industry News

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

The Hacker News
Industry News

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving LLMs, has come under active exploitation in the wild less than 13 hours after its public disclosure. The vulnerability, tracked as CVE-2026-33626 (CVSS score: 7.5), relates to a Server-Side R...

The Hacker NewsApr 24, 20261m4
Vulnerabilities

ISC Stormcast For Friday, April 24th, 2026 https://isc.sans.edu/podcastdetail/9906, (Fri, Apr 24th)

SANS ISC
Vulnerabilities

ISC Stormcast For Friday, April 24th, 2026 https://isc.sans.edu/podcastdetail/9906, (Fri, Apr 24th)

No description available.

SANS ISCApr 24, 20261m4
Industry News

Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets

Dark Reading
Industry News

Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets

The Chinese state-sponsored cyber threat is known for moving fast and trying odd attack vectors; now it's branching out in tools, victimology, and TTPs.

Dark ReadingApr 24, 20261m4
Industry News

Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia

Dark Reading
Industry News

Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia

The threat actor gave itself plenty of options to support command and control, tapping Microsoft Outlook, Slack, Discord, and file.io for online espionage.

Dark ReadingApr 24, 20261m6
Hackers exploit file upload bug in Breeze Cache WordPress plugin
BleepingComputer
Malware & Threats

Hackers exploit file upload bug in Breeze Cache WordPress plugin

Hackers are actively exploiting a critical vulnerability in the Breeze Cache plugin for WordPress that allows uploading arbitrary files on the server without authentication.

BleepingComputerApr 23, 20262m4
Industry News

China-Backed Hackers Are Industrializing Botnets

Dark Reading
Industry News

China-Backed Hackers Are Industrializing Botnets

China's state-backed groups are now using covert networks of compromised devices to execute attacks in a low-cost, low-risk, and deniable way.

Dark ReadingApr 23, 20261m4
Bitwarden CLI npm package compromised to steal developer credentials
BleepingComputer
Malware & Threats

Bitwarden CLI npm package compromised to steal developer credentials

The Bitwarden CLI was briefly compromised after attackers uploaded a malicious @bitwarden/cli package to npm containing a credential-stealing payload capable of spreading to other projects.

BleepingComputerApr 23, 20264m5
Trigona ransomware attacks use custom exfiltration tool to steal data
BleepingComputer
Malware & Threats

Trigona ransomware attacks use custom exfiltration tool to steal data

Recently observed Trigona ransomware attacks are using a custom, command-line tool to steal data from compromised environments faster and more efficiently.

BleepingComputerApr 23, 20263m5