Fixed Intel
Newspaper

Industry News

General cybersecurity industry news, market trends, and analysis

Where Multi-Factor Authentication Stops and Credential Abuse Starts
The Hacker News
Industry News

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Seven Windows authentication paths bypass MFA protections, enabling credential attacks through AD, NTLM, Kerberos, RDP, SMB, and service accounts.

The Hacker News4d ago6m0
APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
The Hacker News
Industry News

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

Researchers uncover APT28-linked phishing attacks against Ukrainian targets deploying BadPaw loader and MeowMeow backdoor for remote system control.

The Hacker News4d ago4m0
Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
The Hacker News
Industry News

Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

Authorities dismantle Tycoon 2FA phishing service linked to 64,000 attacks, millions of emails, and breaches at nearly 100,000 organizations worldwide

The Hacker News5d ago5m0
FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials
The Hacker News
Industry News

FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials

Authorities dismantled LeakBase, a cybercrime forum with 142,000 members trading stolen credentials and financial data in a global crackdown.

The Hacker News5d ago3m0
Smashing Security podcast #457: How a cybersecurity boss framed his own employee
Graham Cluley
Industry News

Smashing Security podcast #457: How a cybersecurity boss framed his own employee

When a top cybersecurity firm discovered it had a leak, you would expect the FBI to be called. Instead, the person put in charge of the investigation was the…

Graham Cluley5d ago3m0
Industry News

VMware Aria Operations Bug Exploited, Cloud Resources at Risk

Dark Reading
Industry News

VMware Aria Operations Bug Exploited, Cloud Resources at Risk

Exploitation of the command injection flaw in VMware Aria Operations could grant an attacker broad acess to victims' cloud environments.

Dark Reading5d ago1m0
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
The Hacker News
Industry News

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

149 hacktivist attacks hit 110 organizations across 16 countries after Middle East conflict, targeting governments, infrastructure, & telecom sectors.

The Hacker News5d ago6m0
Industry News

Stranger Things Meets Cybersecurity: Lessons from the Hive Mind

Dark Reading
Industry News

Stranger Things Meets Cybersecurity: Lessons from the Hive Mind

Events and concepts from the Stranger Things television series illustrate how enterprises can defend their networks and stay "right side up."

Dark Reading5d ago1m0
Industry News

Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate

Dark Reading
Industry News

Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate

Dark Reading Confidential Episode 15: Interpol relied on Will Thomas and team to help break up a sprawling cybercrime ring, leading to the arrest of 574 suspects, the recovery of more than $3 million, and the decryption of six malware variants. Here's his story.

Dark Reading5d ago1m0
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
The Hacker News
Industry News

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

Google uncovered Coruna iOS exploit kit with 23 exploits across five chains targeting iPhones running iOS 13–17.2.1.

The Hacker News5d ago6m0
New RFP Template for AI Usage Control and AI Governance 
The Hacker News
Industry News

New RFP Template for AI Usage Control and AI Governance 

New RFP guide helps CISOs evaluate AI governance tools, focusing on interaction-level security and vendor accountability.

The Hacker News5d ago4m0
Industry News

China's Silver Dragon Razes Governments in EU, SE Asia

Dark Reading
Industry News

China's Silver Dragon Razes Governments in EU, SE Asia

The emerging actor, part of the APT41 nexus, gains initial access via phishing, and uses legitimate network services to obscure cyber espionage activities.

Dark Reading5d ago1m0