Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Vulnerabilities

Siemens SIMATIC

CISA Alerts
Critical
Vulnerabilities
93/10

Siemens SIMATIC

Affected devices do not properly sanitize contents of trace files. This could allow an attacker to inject code through social engineering a legitimate user to import a specially crafted trace file

Critical ManufacturingIndustrial Control Systems
CISA AlertsMar 12, 202610m6
US charges another ransomware negotiator linked to BlackCat attacks
BleepingComputer
Malware & Threats

US charges another ransomware negotiator linked to BlackCat attacks

The U.S. Department of Justice charged another former DigitalMint employee for his involvement in an insider scheme in which ransomware negotiators secretly partnered with the BlackCat (ALPHV) ransomware operation.

BleepingComputerMar 12, 20263m5
Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload
The Hacker News
Industry News

Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload

Phishing floods overwhelm SOC analysts; with 66% unable to keep up, attackers hide spear-phishing in alert queues, increasing breach risk.

The Hacker NewsMar 12, 202612m5
Cisco Patches High-Severity IOS XR Vulnerabilities
SecurityWeek
Industry News

Cisco Patches High-Severity IOS XR Vulnerabilities

The security defects could lead to denial-of-service (DoS) conditions, command execution, or device takeover.

SecurityWeekMar 12, 20262m5
Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit
The Hacker News
Industry News

Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

Apple backports CVE-2023-43010 WebKit fix after Coruna exploit kit abused iOS flaws, protecting older iPhones and iPads from memory corruption attacks

The Hacker NewsMar 12, 20264m5
Critical N8n Vulnerabilities Allowed Server Takeover
SecurityWeek
Industry News

Critical N8n Vulnerabilities Allowed Server Takeover

The bugs allowed unauthenticated attackers to execute arbitrary code, steal credentials, and take over servers.

SecurityWeekMar 12, 20262m5
Polyfill Supply Chain Attack Impacting 100k Sites Linked to North Korea
SecurityWeek
Industry News

Polyfill Supply Chain Attack Impacting 100k Sites Linked to North Korea

The 2024 incident was initially linked to China, but an infostealer infection has now revealed North Korean involvement.

SecurityWeekMar 12, 20263m5
Industry News

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

The Hacker News
Industry News

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

Cybersecurity researchers have discovered half-a-dozen new Android malware families that come with capabilities to steal data from compromised devices and conduct financial fraud. The Android malware range from traditional banking trojans like PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, and Ob...

The Hacker NewsMar 12, 20261m5
CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed
The Hacker News
Industry News

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

CISA adds n8n RCE flaw CVE-2025-68613 to KEV after active exploitation; 24,700 exposed instances raise compromise risk.

The Hacker NewsMar 12, 20262m5
Vulnerabilities

ISC Stormcast For Thursday, March 12th, 2026 https://isc.sans.edu/podcastdetail/9846, (Thu, Mar 12th)

SANS ISC
Vulnerabilities

ISC Stormcast For Thursday, March 12th, 2026 https://isc.sans.edu/podcastdetail/9846, (Thu, Mar 12th)

No description available.

SANS ISCMar 12, 20261m5
Vulnerabilities

When your IoT Device Logs in as Admin, It?s too Late! [Guest Diary], (Wed, Mar 11th)

SANS ISC
High
Vulnerabilities
72/10

When your IoT Device Logs in as Admin, It?s too Late! [Guest Diary], (Wed, Mar 11th)

[This is a Guest Diary by Adam Thorman, an ISC intern as part of the SANS.edu BACS program]

ManufacturingHealthcare
SANS ISCMar 12, 20261m5
Smashing Security podcast #458: How not to steal $46 million from the US government
Graham Cluley
Industry News

Smashing Security podcast #458: How not to steal $46 million from the US government

A Wikipedia security engineer accidentally wakes a dormant JavaScript worm that hadn’t stirred since 2024 – and within minutes, giant woodpecker images are…

Graham CluleyMar 12, 20262m5