Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Industry News

Fortinet Issues Emergency Patch for FortiClient Zero-Day

Dark Reading
Industry News

Fortinet Issues Emergency Patch for FortiClient Zero-Day

The authentication bypass flaw, tracked as CVE-2026-35616, is the latest in a series of Fortinet vulnerabilities that have been exploited in the wild.

Dark ReadingApr 6, 20261m5
Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit
BleepingComputer
Malware & Threats

Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit

Exploit code has been released for an unpatched Windows privilege escalation flaw reported privately to Microsoft, allowing attackers to gain SYSTEM or elevated administrator permissions.

BleepingComputerApr 6, 20263m5
Microsoft fixes Classic Outlook bug causing email delivery issues
BleepingComputer
Malware & Threats

Microsoft fixes Classic Outlook bug causing email delivery issues

Microsoft has resolved a known issue that was preventing some Classic Outlook users from sending emails via Outlook.com.

BleepingComputerApr 6, 20262m5
Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations
The Hacker News
Industry News

Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations

Iran-linked attacks hit 300+ Israeli M365 orgs in March 2026, reviving ransomware campaigns and escalating regional cyber risks.

The Hacker NewsApr 6, 20264m5
Microsoft removes Support and Recovery Assistant from Windows
BleepingComputer
Malware & Threats

Microsoft removes Support and Recovery Assistant from Windows

Microsoft has deprecated and removed the Support and Recovery Assistant (SaRA) command-line utility from all in-support versions of Windows updates starting March 10.

BleepingComputerApr 6, 20263m5
Microsoft links Medusa ransomware affiliate to zero-day attacks
BleepingComputer
Malware & Threats

Microsoft links Medusa ransomware affiliate to zero-day attacks

Microsoft says that Storm-1175, a China-based financially motivated cybercriminal group known for deploying Medusa ransomware payloads, has been deploying n-day and zero-day exploits in high-velocity attacks.

BleepingComputerApr 6, 20263m5
Drift $280M crypto theft linked to 6-month in-person operation
BleepingComputer
Malware & Threats

Drift $280M crypto theft linked to 6-month in-person operation

The Drift Protocol says that the $280+ million hack it suffered last week was the result of a long-term, carefully planned operation that included building "a functioning operational presence inside the Drift ecosystem."

BleepingComputerApr 6, 20263m6
DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea
The Hacker News
Industry News

DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea

DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data exfiltration.

The Hacker NewsApr 6, 20264m5
CISA orders feds to patch Fortinet flaw exploited in attacks by Friday
BleepingComputer
Malware & Threats

CISA orders feds to patch Fortinet flaw exploited in attacks by Friday

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered federal agencies to secure FortiClient Enterprise Management Server (EMS) instances against an actively exploited vulnerability by Friday.

BleepingComputerApr 6, 20263m5
Google DeepMind Researchers Map Web Attacks Against AI Agents
SecurityWeek
Industry News

Google DeepMind Researchers Map Web Attacks Against AI Agents

Malicious web content can be used to manipulate, deceive, and exploit autonomous AI agents navigating the internet, Google DeepMind researchers show. The researchers have identified six types of attacks against AI agents that can be mounted via web content to inject malicious context and trigger ...

SecurityWeekApr 6, 20264m5
Industry News

Automated Credential Harvesting Campaign Exploits React2Shell Flaw

Dark Reading
Industry News

Automated Credential Harvesting Campaign Exploits React2Shell Flaw

An emerging threat cluster tracked as UAT-10608 is exploiting vulnerable Web-exposed Next.js apps and using an automated tool to exfiltrate credentials, secrets, and other system data.

Dark ReadingApr 6, 20261m5
Industry News

Shadow AI in Healthcare is Here to Stay

Dark Reading
Industry News

Shadow AI in Healthcare is Here to Stay

Medical professionals are not going to stop using AI tools to manage growing workloads. Organizations should prioritize bolstering security protocols to limit their blast radius.

Dark ReadingApr 6, 20261m5