Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

Hackers exploit TrueConf zero-day to push malicious software updates
BleepingComputer
Malware & Threats

Hackers exploit TrueConf zero-day to push malicious software updates

Hackers have targeted TrueConf conference servers in attacks that exploit a zero-day vulnerability, allowing them to execute arbitrary files on all connected endpoints.

BleepingComputerApr 1, 20263m6
New EvilTokens service fuels Microsoft device code phishing attacks
BleepingComputer
Malware & Threats

New EvilTokens service fuels Microsoft device code phishing attacks

A new malicious kit called EvilTokens integrates device code phishing capabilities, allowing attackers to hijack Microsoft accounts and provide advanced features for business email compromise attacks.

BleepingComputerApr 1, 20263m6
Industry News

LatAm's Self-Taught Cyber Talent Overlooked Amid Cyberattack Glut

Dark Reading
Industry News

LatAm's Self-Taught Cyber Talent Overlooked Amid Cyberattack Glut

A newly released study exclusively shared with Dark Reading details the unique circumstances that make up Latin America's labor pool, and why organizations may want to expand their talent search.

Dark ReadingApr 1, 20261m5
'NoVoice' Android malware on Google Play infected 2.3 million devices
BleepingComputer
Malware & Threats

'NoVoice' Android malware on Google Play infected 2.3 million devices

A new Android malware named NoVoice was found on Google Play, hidden in more than 50 apps that were downloaded at least 2.3 million times.

BleepingComputerApr 1, 20264m6
Industry News

Cyberattacks Intensify Pressure on Latin American Governments

Dark Reading
Industry News

Cyberattacks Intensify Pressure on Latin American Governments

Cyber threats across Latin America are increasingly targeting government systems, from disruptive attacks in Puerto Rico to a surge of probes against Colombia’s health sector.

Dark ReadingApr 1, 20261m5
Depthfirst Raises $80 Million in Series B Funding
SecurityWeek
Industry News

Depthfirst Raises $80 Million in Series B Funding

The startup will expand its AI research team, train additional security models, and scale enterprise adoption.

SecurityWeekApr 1, 20262m5
CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails
The Hacker News
Industry News

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

CERT-UA impersonation on March 26–27, 2026 spread AGEWHEEZE malware, infecting few devices despite 1M phishing emails.

The Hacker NewsApr 1, 20263m5
Toy Giant Hasbro Hit by Cyberattack
SecurityWeek
Industry News

Toy Giant Hasbro Hit by Cyberattack

The company is investigating the full scope of the incident, including whether any files have been compromised.

SecurityWeekApr 1, 20262m5
New DeepLoad Malware Dropped in ClickFix Attacks
SecurityWeek
Industry News

New DeepLoad Malware Dropped in ClickFix Attacks

The malware steals credentials, installs a malicious browser extension, and can spread via USB drives.

SecurityWeekApr 1, 20263m5
Industry News

Venom Stealer MaaS Platform Commoditizes ClickFix Attacks

Dark Reading
Industry News

Venom Stealer MaaS Platform Commoditizes ClickFix Attacks

A new service on the cybercrime market provides automated capabilities to create persistent information-stealing social engineering attacks.

Dark ReadingApr 1, 20261m5
Exploited Zero-Day Among 21 Vulnerabilities Patched in Chrome
SecurityWeek
Industry News

Exploited Zero-Day Among 21 Vulnerabilities Patched in Chrome

Google has announced fixes for CVE-2026-5281, a zero-day affecting Chrome’s Dawn component.

SecurityWeekApr 1, 20262m5
Routine Access Is Powering Modern Intrusions, a New Threat Report Finds
BleepingComputer
Malware & Threats

Routine Access Is Powering Modern Intrusions, a New Threat Report Finds

Modern intrusions increasingly start with valid credentials and routine access, not exploits. Blackpoint Cyber's upcoming threat report shows how VPN abuse, RMM tools, and social engineering drive most incidents.

BleepingComputerApr 1, 20264m6