Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets
The Hacker News
Industry News

EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets

EngageLab SDK flaw exposed 50M+ Android installs after April 2025 disclosure, risking crypto wallet data until November 2025 patch.

The Hacker NewsApr 9, 20263m5
UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns
The Hacker News
Industry News

UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns

UAT-10362 spear-phishing targets Taiwanese NGOs in October 2025, deploying LucidRook malware for data exfiltration and stealthy persistence.

The Hacker NewsApr 9, 20263m5
Smart Slider updates hijacked to push malicious WordPress, Joomla versions
BleepingComputer
Malware & Threats

Smart Slider updates hijacked to push malicious WordPress, Joomla versions

Hackers hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla, and pushed a malicious version with multiple backdoors.

BleepingComputerApr 9, 20264m5
When attackers already have the keys, MFA is just another door to open
BleepingComputer
Malware & Threats

When attackers already have the keys, MFA is just another door to open

Stolen credentials turn authentication systems into the attack surface. Token shows how wearable biometric authentication verifies the user—not the session—blocking phishing relays and MFA bypass.

BleepingComputerApr 9, 202610m5
Apple Intelligence AI Guardrails Bypassed in New Attack
SecurityWeek
Industry News

Apple Intelligence AI Guardrails Bypassed in New Attack

RSAC researchers hacked Apple Intelligence using the Neural Exect method and Unicode manipulation.

SecurityWeekApr 9, 20263m5
Can we Trust AI? No – But Eventually We Must
SecurityWeek
Industry News

Can we Trust AI? No – But Eventually We Must

From hallucinations and bias to model collapse and adversarial abuse, today’s AI is built on probability rather than truth, yet enterprises are deploying it at speed without fully understanding the risks.

SecurityWeekApr 9, 202616m5
Industry News

Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?

Dark Reading
Industry News

Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?

Its Mythos Preview model, which can allegedly find and exploit critical zero-days, also comes with certain controls, the vendor said.

Dark ReadingApr 9, 20261m5
ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories
The Hacker News
Industry News

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

This week in cybersecurity: botnets, RCE flaws, AI-driven attacks, stealers, and more. Fast, no-fluff roundup.

The Hacker NewsApr 9, 202616m5
Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access
SecurityWeek
Industry News

Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access

Dozens of such keys can be extracted from apps’ decompiled code to gain access to all Gemini endpoints.

SecurityWeekApr 9, 20263m5
Webinar: From noise to signal - What threat actors are targeting next
BleepingComputer
Malware & Threats

Webinar: From noise to signal - What threat actors are targeting next

Threat actors often signal their intentions before launching attacks, from dark web chatter to access-broker listings and credential requests. Join our upcoming webinar with Flare Systems to learn how to turn those early warning signs into proactive defensive action before an intrusion begins.

BleepingComputerApr 9, 20262m5
Vulnerabilities

GPL Odorizers GPL750

CISA Alerts
Vulnerabilities

GPL Odorizers GPL750

View CSAF

CISA AlertsApr 9, 20263m5
Vulnerabilities

Contemporary Controls BASC 20T

CISA Alerts
Vulnerabilities

Contemporary Controls BASC 20T

View CSAF

CISA AlertsApr 9, 20263m5