Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Cape Raises $100 Million for Protection Against Cellular Security Threats
SecurityWeek
Industry News

Cape Raises $100 Million for Protection Against Cellular Security Threats

Cape offers a privacy-focused mobile virtual network operator (MVNO) service for consumers, enterprises, and governments.

SecurityWeekMar 20, 20262m1
Navia Data Breach Impacts 2.7 Million
SecurityWeek
Industry News

Navia Data Breach Impacts 2.7 Million

Between late December 2025 and mid-January 2026, hackers stole personal and health plan information from Navia’s environment.

SecurityWeekMar 20, 20262m1
Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
The Hacker News
Industry News

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams

Google adds 24-hour sideloading delay amid 17 malware families in 4 months, reducing scam-driven installs and device compromise risk.

The Hacker NewsMar 20, 20264m1
Thousands of Magento Sites Hit in Ongoing Defacement Campaign
SecurityWeek
Industry News

Thousands of Magento Sites Hit in Ongoing Defacement Campaign

The attacks started on February 27 and have targeted e-commerce platforms, global brands, and government services.

SecurityWeekMar 20, 20263m1
Industry News

LeakNet ransomware: what you need to know

Graham Cluley
Industry News

LeakNet ransomware: what you need to know

A ransomware gang that claims to be a group of "investigative journalists"? Meet LeakNet - the group using fake CAPTCHA pages to trick employees into hacking themselves. Read more in my article on the Fortra blog.

Graham CluleyMar 20, 20261m1
The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks
The Hacker News
Industry News

The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

AI-based cyber attacks often blend in with normal behavior. Learn why behavioral analytics must adapt to protect digital identities from AI-based thre

The Hacker NewsMar 20, 20265m1
Musician admits to $10M streaming royalty fraud using AI bots
BleepingComputer
Malware & Threats

Musician admits to $10M streaming royalty fraud using AI bots

North Carolina musician Michael Smith has pleaded guilty to collecting over $10 million in royalty payments through a massive streaming royalty fraud scheme on Spotify, Apple Music, Amazon Music, and YouTube Music.

BleepingComputerMar 20, 20263m2
Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover
The Hacker News
Critical
Industry News
92/10

Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover

Magento flaw allows unauthenticated file uploads up to 2.4.9-alpha2, enabling RCE or takeover, exposing stores to attack risk.

E-CommerceRetail
The Hacker NewsMar 20, 20262m1
Allure Security Raises $17 Million for Online Brand Protection
SecurityWeek
Industry News

Allure Security Raises $17 Million for Online Brand Protection

The company will invest in expanding its digital brand protection platform and in scaling its go-to-market efforts.

SecurityWeekMar 20, 20262m1
Vulnerabilities

GSocket Backdoor Delivered Through Bash Script, (Fri, Mar 20th)

SANS ISC
Vulnerabilities

GSocket Backdoor Delivered Through Bash Script, (Fri, Mar 20th)

Yesterday, I discovered a malicious Bash script that installs a GSocket backdoor on the victim's computer. I don't know the source of the script not how it is delivered to the victim.

SANS ISCMar 20, 20261m2
Critical Langflow Vulnerability Exploited Hours After Public Disclosure
SecurityWeek
Industry News

Critical Langflow Vulnerability Exploited Hours After Public Disclosure

Because attacker-supplied flow data is used in public flows, the bug leads to unauthenticated remote code execution.

SecurityWeekMar 20, 20263m2
International joint action disrupts world’s largest DDoS botnets
BleepingComputer
Malware & Threats

International joint action disrupts world’s largest DDoS botnets

Authorities from the United States, Germany, and Canada have taken down Command and Control (C2) infrastructure used by the Aisuru, KimWolf, JackSkid, and Mossad botnets to infect Internet of Things (IoT) devices.

BleepingComputerMar 20, 20263m2