Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Vulnerabilities

Schneider Electric EcoStruxure PME and EPO

CISA Alerts
Vulnerabilities

Schneider Electric EcoStruxure PME and EPO

View CSAF

CISA AlertsMar 19, 202610m2
Vulnerabilities

Automated Logic WebCTRL Premium Server

CISA Alerts
Vulnerabilities

Automated Logic WebCTRL Premium Server

View CSAF

CISA AlertsMar 19, 20264m1
Vulnerabilities

CTEK Chargeportal

CISA Alerts
Vulnerabilities

CTEK Chargeportal

View CSAF

CISA AlertsMar 19, 20264m2
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsMar 19, 20261m2
CISA urges US orgs to secure Microsoft Intune systems after Stryker breach
BleepingComputer
Malware & Threats

CISA urges US orgs to secure Microsoft Intune systems after Stryker breach

CISA warned U.S. organizations to follow Microsoft guidance to strengthen the Intune endpoint management tool after a cyberattack exploited it to wipe medical technology giant Stryker's systems.

BleepingComputerMar 19, 20263m2
How Ceros Gives Security Teams Visibility and Control in Claude Code
The Hacker News
Industry News

How Ceros Gives Security Teams Visibility and Control in Claude Code

Claude Code bypasses security controls by acting locally before monitoring, exposing data risks and audit gaps.

The Hacker NewsMar 19, 202610m2
Raven Emerges From Stealth With $20 Million in Funding
SecurityWeek
Industry News

Raven Emerges From Stealth With $20 Million in Funding

Raven’s platform observes applications at runtime to detect anomalous behavior and prevent cyberattacks.

SecurityWeekMar 19, 20262m2
New ‘Perseus’ Android malware checks user notes for secrets
BleepingComputer
Malware & Threats

New ‘Perseus’ Android malware checks user notes for secrets

A new Android malware called Perseus is checking user-curated notes to steal  sensitive information, like passwords, recovery phrases, or financial data.

BleepingComputerMar 19, 20264m2
Critical Microsoft SharePoint flaw now exploited in attacks
BleepingComputer
Malware & Threats

Critical Microsoft SharePoint flaw now exploited in attacks

A critical Microsoft SharePoint vulnerability patched in January is now being exploited in attacks, the Cybersecurity and Infrastructure Security Agency (CISA) warned.

BleepingComputerMar 19, 20262m2
CISA Warns of Attacks Exploiting Recent SharePoint Vulnerability
SecurityWeek
Industry News

CISA Warns of Attacks Exploiting Recent SharePoint Vulnerability

The SharePoint remote code execution vulnerability CVE-2026-20963, which Microsoft patched in January, has been exploited in the wild.

SecurityWeekMar 19, 20262m2
DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover
The Hacker News
Industry News

DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover

DarkSword exploit targets iOS 18.4–18.7 using 6 flaws and 3 zero-days, enabling rapid data theft from iPhones across multiple countries.

The Hacker NewsMar 19, 20267m2
Cisco Firewall Vulnerability Exploited as Zero-Day in Interlock Ransomware Attacks
SecurityWeek
Industry News

Cisco Firewall Vulnerability Exploited as Zero-Day in Interlock Ransomware Attacks

Amazon found evidence that the FMC software vulnerability has been exploited since late January, and found links to Russia.

SecurityWeekMar 19, 20262m2