Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Vulnerabilities

A React-based phishing page with credential exfiltration via EmailJS, (Fri, Mar 13th)

SANS ISC
Vulnerabilities

A React-based phishing page with credential exfiltration via EmailJS, (Fri, Mar 13th)

On Wednesday, a phishing message made its way into our handler inbox that contained a fairly typical low-quality lure, but turned out to be quite interesting in the end nonetheless. That is because the accompanying credential stealing web page was dynamically constructed using React and used a le...

SANS ISCMar 13, 20261m5
Google fixes two new Chrome zero-days exploited in attacks
BleepingComputer
Malware & Threats

Google fixes two new Chrome zero-days exploited in attacks

Google has released emergency security updates to patch two high-severity Chrome vulnerabilities exploited in zero-day attacks.

BleepingComputerMar 13, 20263m5
Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries
The Hacker News
Industry News

Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries

Operation Lightning dismantled SocksEscort proxy botnet exploiting 369,000 IPs in 163 countries, disrupting fraud networks and freezing $3.5M crypto.

The Hacker NewsMar 13, 20264m5
Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution
The Hacker News
Industry News

Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution

Veeam fixes 7 Backup & Replication flaws, including CVSS 9.9 RCE bugs, warning attackers may exploit unpatched systems.

The Hacker NewsMar 13, 20262m6
Vulnerabilities

ISC Stormcast For Friday, March 13th, 2026 https://isc.sans.edu/podcastdetail/9848, (Fri, Mar 13th)

SANS ISC
Info
Vulnerabilities
10/10

ISC Stormcast For Friday, March 13th, 2026 https://isc.sans.edu/podcastdetail/9848, (Fri, Mar 13th)

No description available.

All SectorsInformation Technology
SANS ISCMar 13, 20261m5
Industry News

Why Post-Quantum Cryptography Can't Wait

Dark Reading
Industry News

Why Post-Quantum Cryptography Can't Wait

Organizations have to prepare to ensure they have cryptography in place in the post-quantum world.

Dark ReadingMar 12, 20261m3
Canadian retail giant Loblaw notifies customers of data breach
BleepingComputer
Malware & Threats

Canadian retail giant Loblaw notifies customers of data breach

Still, out of an abundance of caution, Loblaw says it has automatically logged out all customers from their accounts. Account holders who need to access the company's digital services will have to log in again.

BleepingComputerMar 12, 20262m5
Industry News

Iran MOIS Colludes With Criminals to Boost Cyberattacks

Dark Reading
Industry News

Iran MOIS Colludes With Criminals to Boost Cyberattacks

Iranian APTs have long pretended to be cybercriminal groups. Now they're working with actual cybercriminal groups.

Dark ReadingMar 12, 20261m5
England Hockey investigating ransomware data breach
BleepingComputer
Malware & Threats

England Hockey investigating ransomware data breach

England Hockey, the governing body for field hockey in England, is investigating a potential data breach after the AiLock ransomware gang listed it as a victim on its data leak site.

BleepingComputerMar 12, 20263m6
Industry News

Commercial Spyware Opponents Fear US Policy Shifting

Dark Reading
Industry News

Commercial Spyware Opponents Fear US Policy Shifting

Rescinded sanctions and reactivated contracts have created confusion about the Trump administration's spyware policy and where it draws the line.

Dark ReadingMar 12, 20261m5
AI-generated Slopoly malware used in Interlock ransomware attack
BleepingComputer
Malware & Threats

AI-generated Slopoly malware used in Interlock ransomware attack

A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware attack.

BleepingComputerMar 12, 20263m5
Industry News

Fraudsters are using public planning records to target permit applicants

Graham Cluley
Industry News

Fraudsters are using public planning records to target permit applicants

If you're in the middle of applying for a planning or zoning permit, there is some unwelcome news: cyber-criminals have found a way to exploit the bureaucratic tedium of the process against you. Read more in my article on the Fortra blog.

Graham CluleyMar 12, 20261m2