Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw
BleepingComputer
Malware & Threats

Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw

Adobe has released an emergency security update for Acrobat Reader to fix a vulnerability, tracked as CVE-2026-34621, that has been exploited in zero-day attacks since at least December.

BleepingComputerApr 13, 20263m5
Industry News

APT41 Delivers 'Zero-Detection' Backdoor to Harvest Cloud Credentials

Dark Reading
Industry News

APT41 Delivers 'Zero-Detection' Backdoor to Harvest Cloud Credentials

The prolific China-backed threat group is targeting AWS, Google, Azure, and Alibaba cloud environments and using typosquatting to obscure C2 communication.

Dark ReadingApr 13, 20261m5
Industry News

FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts

The Hacker News
Industry News

FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts

The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit called W3LL to steal thousands of victims' account credentials and attempt more...

The Hacker NewsApr 13, 20261m5
Booking.com Says Hackers Accessed User Information
SecurityWeek
Industry News

Booking.com Says Hackers Accessed User Information

The online travel platform has not said how many customers’ booking information was exposed, but said the issue has been contained.

SecurityWeekApr 13, 20262m5
The silent “Storm”: New infostealer hijacks sessions, decrypts server-side
BleepingComputer
Malware & Threats

The silent “Storm”: New infostealer hijacks sessions, decrypts server-side

New "Storm" infostealer skips local decryption, sending browser data to attacker servers. Varonis shows how server-side decryption enables session hijacking, bypassing passwords and MFA.

BleepingComputerApr 13, 20265m5
BrowserGate: Claims of LinkedIn ‘Spying’ Clash With Security Research Findings
SecurityWeek
Industry News

BrowserGate: Claims of LinkedIn ‘Spying’ Clash With Security Research Findings

Claims that “Microsoft is running one of the largest corporate espionage operations in modern history” face scrutiny as researchers analyze LinkedIn’s browser extension probing

SecurityWeekApr 13, 20266m5
Vulnerabilities

Scans for EncystPHP Webshell, (Mon, Apr 13th)

SANS ISC
Vulnerabilities

Scans for EncystPHP Webshell, (Mon, Apr 13th)

Last week, I wrote about attackers scanning for various webshells, hoping to find some that do not require authentication or others that use well-known credentials. But some attackers are paying attention and are deploying webshells with more difficult-to-guess credentials. Today, I noticed some ...

SANS ISCApr 13, 20261m5
Industry News

⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

The Hacker News
Industry News

⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

Monday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are tracking a critical zero-day that has been quietly living in your PDFs for months, plus some aggressive state-sponsored meddling in infrastructure that is finally coming to light. It is one of those mornings ...

The Hacker NewsApr 13, 20261m5
OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack
SecurityWeek
Industry News

OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack

The AI giant is taking action after determining that a macOS code signing certificate may have been compromised.

SecurityWeekApr 13, 20263m5
Vulnerabilities

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

CISA Alerts
Vulnerabilities

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

CISA has added seven new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsApr 13, 20262m5
Your MTTD Looks Great. Your Post-Alert Gap Doesn't
The Hacker News
Industry News

Your MTTD Looks Great. Your Post-Alert Gap Doesn't

AI-driven attacks exploiting zero-days and 29-minute breakout times expose SOC investigation gaps, accelerating the shift to automated response.

The Hacker NewsApr 13, 20266m5
International Operation Targets Multimillion-Dollar Crypto Theft Schemes
SecurityWeek
Industry News

International Operation Targets Multimillion-Dollar Crypto Theft Schemes

Law enforcement in the US, UK and Canada identified more than $45 million in cryptocurrency and froze $12 million.

SecurityWeekApr 13, 20262m5