Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Fake Claude AI website delivers new 'Beagle' Windows malware
BleepingComputer
Malware & Threats

Fake Claude AI website delivers new 'Beagle' Windows malware

A fake version for the Claude AI website offers a malicious Claude-Pro Relay download that pushes a previously undocumented backdoor for Windows named Beagle.

BleepingComputer1d ago4m3
PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux
The Hacker News
Industry News

PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux

ZiChatBot malware spread via 3 PyPI packages in July 2025 uses Zulip APIs as C2, enabling stealthy attacks across systems

The Hacker News1d ago3m2
Claude AI Guided Hackers Toward OT Assets During Water Utility Intrusion
SecurityWeek
Industry News

Claude AI Guided Hackers Toward OT Assets During Water Utility Intrusion

Dragos has published a report describing how threat actors used Claude AI in an attack on a water and drainage utility in Mexico.

SecurityWeek1d ago3m2
vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution
The Hacker News
Industry News

vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution

12 vm2 flaws (CVSS up to 10.0) enable sandbox escape in ≤3.11.1, causing remote code execution risk; patched in 3.11.2.

The Hacker News1d ago3m2
Vulnerabilities

ISC Stormcast For Thursday, May 7th, 2026 https://isc.sans.edu/podcastdetail/9922, (Thu, May 7th)

SANS ISC
Vulnerabilities

ISC Stormcast For Thursday, May 7th, 2026 https://isc.sans.edu/podcastdetail/9922, (Thu, May 7th)

No description available.

SANS ISC1d ago1m2
Vulnerabilities

An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th)

SANS ISC
Vulnerabilities

An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th)

[This is a Guest Diary by Eric Roldan, an ISC intern as part of the SANS.edu BACS program]

SANS ISC1d ago1m2
Smashing Security podcast #466: Meta sees everything, Copy Fail, and a deepfake gets hired
Graham Cluley
Industry News

Smashing Security podcast #466: Meta sees everything, Copy Fail, and a deepfake gets hired

Meta’s smart glasses promise privacy “designed for you” – but everything they record was being beamed off to workers in Nairobi to label by hand.

Graham Cluley1d ago56m2
Hackers abuse Google ads for GoDaddy ManageWP login phishing
BleepingComputer
Malware & Threats

Hackers abuse Google ads for GoDaddy ManageWP login phishing

A phishing campaign delivered through Google sponsored search results is targeting credentials for ManageWP, GoDaddy's platform for managing fleets of WordPress websites.

BleepingComputer1d ago3m2
Industry News

Yet Another Way to Bypass Google Chrome's Encryption Protection

Dark Reading
Industry News

Yet Another Way to Bypass Google Chrome's Encryption Protection

Authors of the VoidStealer Trojan uncovered a way to get around Google's App-Bound Encryption (ABE), opening the door to infostealers.

Dark Reading1d ago1m2
Industry News

Instructure Breach Exposes Schools' Vendor Dependence

Dark Reading
Industry News

Instructure Breach Exposes Schools' Vendor Dependence

ShinyHunters' attack on Instructure, which owns the widely used Canvas learning management system (LMS), carries big questions about the trust educational institutions put into their vendors.

Dark Reading1d ago1m2
Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks
The Hacker News
Industry News

Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks

xlabs_v1 botnet exploits ADB port 5555 to recruit IoT devices, enabling 21 DDoS methods and bandwidth-tiered attacks on gaming servers

The Hacker News1d ago4m2
Critical vm2 sandbox bug lets attackers execute code on hosts
BleepingComputer
Malware & Threats

Critical vm2 sandbox bug lets attackers execute code on hosts

A critical vulnerability in the popular Node.js sandboxing library vm2 allows escaping the sandbox and executing arbitrary code on the host system.

BleepingComputer1d ago3m2