Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Manifold Raises $8 Million for AI Detection and Response
SecurityWeek
Industry News

Manifold Raises $8 Million for AI Detection and Response

Focused on securing autonomous AI on endpoints, the startup will invest in product development.

SecurityWeekMar 18, 20262m2
Nordstrom's email system abused to send crypto scams to customers
BleepingComputer
Malware & Threats

Nordstrom's email system abused to send crypto scams to customers

Customers of upscale department store chain Nordstrom received fraudulent messages from a legitimate company email address that promoted cryptocurrency scams disguised as a St. Patrick's Day promotion.

BleepingComputerMar 18, 20263m2
Vulnerabilities

Scans for "adminer", (Wed, Mar 18th)

SANS ISC
Vulnerabilities

Scans for "adminer", (Wed, Mar 18th)

A very popular target of attackers scanning our honeypots is "phpmyadmin". phpMyAdmin is a script first released in the late 90s, before many security concepts had&#;x26;#;xc2;&#;x26;#;xa0;been discovered. It&#;x26;#;39;s rich history of vulnerabilities made it a favorite target. Its alternative,...

SANS ISCMar 18, 20261m2
Industry News

Meta, TikTok Steal Users' Sensitive PII When They Click on Ads

Dark Reading
Industry News

Meta, TikTok Steal Users' Sensitive PII When They Click on Ads

Tracking pixels let social media companies spy on their own customers when they click over to advertiser sites, gleaning credit card info, currency type, and more.

Dark ReadingMar 18, 20261m2
Industry News

SideWinder Espionage Campaign Expands Across Southeast Asia

Dark Reading
Industry News

SideWinder Espionage Campaign Expands Across Southeast Asia

The suspected India-linked threat group targets governments, telecom, and critical infrastructure using spear-phishing, old vulnerabilities, and rapidly rotating infrastructure to maintain persistent access.

Dark ReadingMar 18, 20261m2
Iranian Hackers Likely Used Malware-Stolen Credentials in Stryker Breach
SecurityWeek
Industry News

Iranian Hackers Likely Used Malware-Stolen Credentials in Stryker Breach

The medtech giant has been working on restoring systems affected by the cyberattack conducted by the Handala hackers.

SecurityWeekMar 18, 20263m2
Apple Debuts Background Security Improvements With Fresh WebKit Patches
SecurityWeek
Industry News

Apple Debuts Background Security Improvements With Fresh WebKit Patches

The lightweight updates are meant to deliver security protections between security updates.

SecurityWeekMar 18, 20262m2
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsMar 18, 20261m2
Vulnerabilities

CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization

CISA Alerts
Vulnerabilities

CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization

CISA is aware of malicious cyber activity targeting endpoint management systems of U.S. organizations based on the March 11, 2026 cyberattack against U.S.-based medical technology firm Stryker Corporation, which affected their Microsoft environment.1 To defend against similar malicious cyber acti...

CISA AlertsMar 18, 20263m2
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsMar 18, 20261m2
Claude Code Security and Magecart: Getting the Threat Model Right
The Hacker News
Industry News

Claude Code Security and Magecart: Getting the Threat Model Right

Magecart hides payload in favicon EXIF via third-party scripts, bypassing static analysis and stealing checkout data at runtime.

The Hacker NewsMar 18, 20267m2
9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors
The Hacker News
Industry News

9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors

Researchers uncovered 9 vulnerabilities across 4 IP KVM devices enabling unauthenticated root access and code execution.

The Hacker NewsMar 18, 20264m2