Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs
The Hacker News
Industry News

OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs

OFAC sanctions DPRK IT fraud network using fake jobs and AI tactics, exposing funding links to WMD programs and insider threats.

The Hacker NewsMar 18, 20266m2
Ransomware gang exploits Cisco flaw in zero-day attacks since January
BleepingComputer
Malware & Threats

Ransomware gang exploits Cisco flaw in zero-day attacks since January

The Interlock ransomware gang has been exploiting a maximum severity remote code execution (RCE) vulnerability in Cisco's Secure Firewall Management Center (FMC) software in zero-day attacks since late January.

BleepingComputerMar 18, 20263m2
Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access
The Hacker News
Industry News

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

Interlock ransomware is actively exploiting CVE-2026-20131 (CVSS 10.0) in Cisco FMC, enabling unauthenticated remote code execution as root.

The Hacker NewsMar 18, 20265m2
Cloud Security Startup Native Exits Stealth With $42 Million in Funding
SecurityWeek
Industry News

Cloud Security Startup Native Exits Stealth With $42 Million in Funding

Phil Venables, former CISO of Google Cloud and now a venture partner at Ballistic Ventures, has joined Native’s board of directors.

SecurityWeekMar 18, 20263m2
Marquis: Ransomware gang stole data of 672K people in cyberattack
BleepingComputer
Malware & Threats

Marquis: Ransomware gang stole data of 672K people in cyberattack

Marquis, a Texas-based financial services provider, revealed this week that a ransomware gang stole the data of over 670,000 individuals in an August 2025 cyberattack that also disrupted operations at 74 banks across the United States.

BleepingComputerMar 18, 20263m2
‘DarkSword’ iOS Exploit Kit Used by State-Sponsored Hackers, Spyware Vendors
SecurityWeek
Industry News

‘DarkSword’ iOS Exploit Kit Used by State-Sponsored Hackers, Spyware Vendors

Targeting six iOS vulnerabilities and leading to full device compromise, the exploit chain is meant for surveillance.

SecurityWeekMar 18, 20265m2
Industry News

'Claudy Day’ Trio of Flaws Exposes Claude Users to Data Theft

Dark Reading
Industry News

'Claudy Day’ Trio of Flaws Exposes Claude Users to Data Theft

A prompt injection vulnerability paired with other flaws can turn a Google search into a full attack chain that could threaten enterprise networks.

Dark ReadingMar 18, 20261m2
Virtual Summit Today: Supply Chain & Third-Party Risk Summit
SecurityWeek
Industry News

Virtual Summit Today: Supply Chain & Third-Party Risk Summit

Cyber risk doesn’t stop at your perimeter. Today’s most dangerous threats could be hiding in your software supply chain.

SecurityWeekMar 18, 20263m2
EU Sanctions Chinese, Iranian Firms Supporting Hacking Operations
SecurityWeek
Industry News

EU Sanctions Chinese, Iranian Firms Supporting Hacking Operations

The sanctions target two Chinese individuals, two Chinese companies, and one Iranian firm involved in hacking EU member states.

SecurityWeekMar 18, 20263m2
The Refund Fraud Economy: Exploiting Major Retailers and Payment Platforms
BleepingComputer
Malware & Threats

The Refund Fraud Economy: Exploiting Major Retailers and Payment Platforms

Refund fraud is now a business, with methods and tutorials sold to exploit return policies for profit. Flare shows how fraudsters turn refunds and chargebacks into a repeatable profit model.

BleepingComputerMar 18, 20268m2
New “Darksword” iOS exploit used in infostealer attack on iPhones
BleepingComputer
Malware & Threats

New “Darksword” iOS exploit used in infostealer attack on iPhones

A new exploit kit for iOS devices and delivery framework dubbed "Darksword" has been used to steal a wide range of personal information, including data from cryptocurrency wallet app.

BleepingComputerMar 18, 20264m2
Shadow AI Risk: How SaaS Apps Are Quietly Enabling Massive Breaches
SecurityWeek
Industry News

Shadow AI Risk: How SaaS Apps Are Quietly Enabling Massive Breaches

From Chaos to Control examines the chaos that often comes from shadow AI hidden in SaaS apps and urges better visibility and control over agentic AI.

SecurityWeekMar 18, 20265m2