Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Drift loses $280 million as hackers seize Security Council powers
BleepingComputer
Malware & Threats

Drift loses $280 million as hackers seize Security Council powers

The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation.

BleepingComputerApr 2, 20262m5
Drift loses $280 million North Korean hackers seize Security Council powers
BleepingComputer
Malware & Threats

Drift loses $280 million North Korean hackers seize Security Council powers

The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation.

BleepingComputerApr 2, 20262m5
Critical Vulnerability in Claude Code Emerges Days After Source Leak
SecurityWeek
Industry News

Critical Vulnerability in Claude Code Emerges Days After Source Leak

Within days of each other, Anthropic first leaked the source code to Claude Code, and then a critical vulnerability was found by Adversa AI.

SecurityWeekApr 2, 20265m6
Apple Rolls Out DarkSword Exploit Protection to More Devices
SecurityWeek
Industry News

Apple Rolls Out DarkSword Exploit Protection to More Devices

The DarkSword exploit kit has been used by both state-sponsored hackers and commercial spyware vendors.

SecurityWeekApr 2, 20262m6
Industry News

RSAC 2026: AI Dominates, But Community Remains Key to Security

Dark Reading
Industry News

RSAC 2026: AI Dominates, But Community Remains Key to Security

As AI took center stage at this year's conference, experts debated automation, oversight and the evolving role of human intelligence in cybersecurity — despite the US government's notable absence.

Dark ReadingApr 2, 20261m6
Residential proxies evaded IP reputation checks in 78% of 4B sessions
BleepingComputer
Malware & Threats

Residential proxies evaded IP reputation checks in 78% of 4B sessions

Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users.

BleepingComputerApr 2, 20263m5
Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise
The Hacker News
Industry News

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

Cisco patches two 9.8 CVSS flaws (CVE-2026-20093, CVE-2026-20160), preventing authentication bypass and root access.

The Hacker NewsApr 2, 20262m5
Vulnerabilities

Attempts to Exploit Exposed "Vite" Installs (CVE-2025-30208), (Thu, Apr 2nd)

SANS ISC
Vulnerabilities

Attempts to Exploit Exposed "Vite" Installs (CVE-2025-30208), (Thu, Apr 2nd)

From its GitHub repo: "Vite (French word for "quick", pronounced /vi?t/, like "veet") is a new breed of frontend build tooling that significantly improves the frontend development experience" [https://github.com/vitejs/vite].

SANS ISCApr 2, 20261m5
Cybersecurity M&A Roundup: 38 Deals Announced in March 2026
SecurityWeek
Industry News

Cybersecurity M&A Roundup: 38 Deals Announced in March 2026

Significant cybersecurity M&A deals announced by Airbus, Cellebrite, Databricks, Quantum eMotion, Rapid7, and OpenAI.

SecurityWeekApr 2, 20265m5
Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime
BleepingComputer
Malware & Threats

Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime

Threat actors are exploiting vacant homes as "drop addresses" to intercept mail and enable fraud. Flare shows how postal services and fake identities are abused to turn mail into a fraud vector.

BleepingComputerApr 2, 20267m6
New Progress ShareFile flaws can be chained in pre-auth RCE attacks
BleepingComputer
Malware & Threats

New Progress ShareFile flaws can be chained in pre-auth RCE attacks

Two vulnerabilities in Progress ShareFile, an enterprise-grade secure file transfer solution, can be chained to enable unauthenticated file exfiltration from affected environments.

BleepingComputerApr 2, 20263m7
Medtech giant Stryker fully operational after data-wiping attack
BleepingComputer
Malware & Threats

Medtech giant Stryker fully operational after data-wiping attack

Stryker Corporation, one of the world's leading medical technology companies, says it's fully operational three weeks after many of its systems were wiped out in a cyberattack claimed by the Iranian-linked Handala hacktivist group.

BleepingComputerApr 2, 20263m6