Fixed Intel

Latest Cybersecurity News

Stay informed with real-time threat intelligence, vulnerability disclosures, and expert analysis from the cybersecurity community.

US Charges Uranium Crypto Exchange Hacker
SecurityWeek
Industry News

US Charges Uranium Crypto Exchange Hacker

Jonathan Spalletta exploited smart contract vulnerabilities to steal approximately $55 million in cryptocurrency and cause Uranium to shut down.

SecurityWeekApr 1, 20262m5
Webinar Today: Agentic AI vs. Identity’s Last Mile Problem
SecurityWeek
Industry News

Webinar Today: Agentic AI vs. Identity’s Last Mile Problem

Join the webcast as we explore what Agentic AI can and cannot solve today, and real world breach scenarios linked to disconnected applications.

SecurityWeekApr 1, 20261m5
Vulnerabilities

TeamPCP Supply Chain Campaign: Update 005 - First Confirmed Victim Disclosure, Post-Compromise Cloud Enumeration Documented, and Axios Attribution Narrows, (Wed, Apr 1st)

SANS ISC
Vulnerabilities

TeamPCP Supply Chain Campaign: Update 005 - First Confirmed Victim Disclosure, Post-Compromise Cloud Enumeration Documented, and Axios Attribution Narrows, (Wed, Apr 1st)

This is the fifth update to the TeamPCP supply chain campaign threat intelligence report, "When the Security Scanner Became the Weapon" (v3.0, March 25, 2026). Update 004 covered developments through March 30, including the Databricks investigation, dual ransomware operations, and AstraZeneca dat...

SANS ISCApr 1, 20261m5
Block the Prompt, Not the Work: The End of "Doctor No"
The Hacker News
Industry News

Block the Prompt, Not the Work: The End of "Doctor No"

70% installed AI extensions after DeepSeek block at U.S. law firm, routing traffic to China servers, exposing compliance risk.

The Hacker NewsApr 1, 20265m5
Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures
The Hacker News
Industry News

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

Augmented Marauder targets Latin America and Europe since 2020, using dynamic PDF phishing to spread Casbaneiro via Horabot.

The Hacker NewsApr 1, 20263m5
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsApr 1, 20261m5
Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass
The Hacker News
Industry News

Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass

WhatsApp VBS campaign began February 2026, abusing AWS and UAC bypass to gain persistent remote access.

The Hacker NewsApr 1, 20263m5
New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released
The Hacker News
Industry News

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

Chrome patches 21 flaws including exploited CVE-2026-5281 in Dawn, marking fourth zero-day fixed in 2026, reducing active attack risk.

The Hacker NewsApr 1, 20262m5
FBI warns against using Chinese mobile apps due to privacy risks
BleepingComputer
Malware & Threats

FBI warns against using Chinese mobile apps due to privacy risks

The U.S. Federal Bureau of Investigation (FBI) warned Americans against using foreign-developed mobile applications, particularly those created by Chinese developers.

BleepingComputerApr 1, 20263m6
3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)
The Hacker News
Industry News

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)

84% of attacks abuse legitimate tools across 700,000 incidents, expanding internal attack surfaces and evading detection defenses.

The Hacker NewsApr 1, 20264m5
Vulnerabilities

Malicious Script That Gets Rid of ADS, (Wed, Apr 1st)

SANS ISC
Vulnerabilities

Malicious Script That Gets Rid of ADS, (Wed, Apr 1st)

Today, most malware are called “fileless” because they try to reduce their footprint on the infected computer filesystem to the bare minimum. But they need to write something… think about persistence. They can use the registry as an alternative storage location.

SANS ISCApr 1, 20261m5
Industry News

Are We Training AI Too Late?

Dark Reading
Industry News

Are We Training AI Too Late?

Ask the Expert: Cybersecurity teams need to expand their field of view to include new, unique threat sources, rather than relying on past, proven threat actors.

Dark ReadingApr 1, 20261m5