Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

UK’s Companies House confirms security flaw exposed business data
BleepingComputer
Malware & Threats

UK’s Companies House confirms security flaw exposed business data

Companies House, a British government agency that operates the registry for all U.K. companies, says its WebFiling service is back online after it was closed on Friday to fix a security flaw that exposed companies' information since October 2025.

BleepingComputerMar 16, 20263m5
Microsoft Exchange Online outage blocks access to mailboxes
BleepingComputer
Malware & Threats

Microsoft Exchange Online outage blocks access to mailboxes

Microsoft is working to address an ongoing Exchange Online outage that is preventing customers from accessing their mailboxes and calendars.

BleepingComputerMar 16, 20262m5
Oracle EBS Hack: Only 4 Corporate Giants Still Silent on Potential Impact
SecurityWeek
Industry News

Oracle EBS Hack: Only 4 Corporate Giants Still Silent on Potential Impact

Broadcom, Bechtel, Estée Lauder, and Abbott Technologies are the only major companies that have yet to issue a public statement.

SecurityWeekMar 16, 20264m5
Security Firm Executive Targeted in Sophisticated Phishing Attack
SecurityWeek
Industry News

Security Firm Executive Targeted in Sophisticated Phishing Attack

The attackers used a DKIM-signed phishing email, trusted redirect infrastructure, compromised servers, and Cloudflare-protected phishing pages.

SecurityWeekMar 16, 20263m5
⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More
The Hacker News
Industry News

⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More

Catch up on the latest cyber threats, attack trends, security research, botnets, phishing, and critical vulnerabilities.

The Hacker NewsMar 16, 202616m6
Industry News

Attackers Abuse LiveChat to Phish Credit Card, Personal Data

Dark Reading
Industry News

Attackers Abuse LiveChat to Phish Credit Card, Personal Data

A social engineering campaign impersonating PayPal and Amazon uses customer support interactions to acquire sensitive info.

Dark ReadingMar 16, 20261m3
Shadow AI is everywhere. Here’s how to find and secure it.
BleepingComputer
Malware & Threats

Shadow AI is everywhere. Here’s how to find and secure it.

Shadow AI is quietly spreading across SaaS environments as employees adopt new AI tools without IT oversight. Nudge Security explains how security teams can discover AI apps, monitor usage, and govern risky AI activity.

BleepingComputerMar 16, 20265m3
Vulnerabilities

/proxy/ URL scans with IP addresses, (Mon, Mar 16th)

SANS ISC
Vulnerabilities

/proxy/ URL scans with IP addresses, (Mon, Mar 16th)

Attempts to find proxy servers are among the most common scans our honeypots detect. Most of the time, the attacker attempts to use a host header or include the hostname in the URL to trigger the proxy server forwarding the request. In some cases, common URL prefixes like "/proxy/" are used. This...

SANS ISCMar 16, 20261m3
Microsoft pulls Samsung app blocking Windows C: drive from Store
BleepingComputer
Malware & Threats

Microsoft pulls Samsung app blocking Windows C: drive from Store

​Microsoft has removed the Samsung Galaxy Connect app from the Microsoft Store because it was causing issues on specific Samsung Galaxy Book 4 and desktop models running Windows 11.

BleepingComputerMar 16, 20262m3
China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation
SecurityWeek
Critical
Industry News
92/10

China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation

The state-sponsored hackers deployed custom tools and stayed dormant in the compromised environments for months.

CL-STA-1087DefenseMilitary
SecurityWeekMar 16, 20264m3
Threat Actor Targeting VPN Users in New Credential Theft Campaign
SecurityWeek
Industry News

Threat Actor Targeting VPN Users in New Credential Theft Campaign

Storm-2561 is distributing fake VPN clients through SEO poisoning, deploying trojans, and stealing login information.

SecurityWeekMar 16, 20263m3
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.

CISA AlertsMar 16, 20261m3