Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Industry News

Flaws in Claude Code Put Developers' Machines at Risk

Dark Reading
Industry News

Flaws in Claude Code Put Developers' Machines at Risk

The vulnerabilities highlight a big drawback to integrating AI into software development workflows and the potential impact on supply chains.

Dark ReadingFeb 25, 20261m0
Industry News

RAMP Forum Seizure Fractures Ransomware Ecosystem

Dark Reading
Industry News

RAMP Forum Seizure Fractures Ransomware Ecosystem

Researchers suggest defenders monitor how these malicious groups re-form and leverage the useful threat intel to guide their next moves.

Dark ReadingFeb 25, 20261m0
Industry News

PCI Council Says Threats to Payments Systems Are Speeding Up

Dark Reading
Industry News

PCI Council Says Threats to Payments Systems Are Speeding Up

The PCI Security Standards Council experienced a record year in many regards, but its first annual report shows it needs to work even faster to stay ahead of attackers.

Dark ReadingFeb 25, 20261m0
Industry News

Malicious Next.js Repos Target Developers Via Fake Job Interviews

Dark Reading
Industry News

Malicious Next.js Repos Target Developers Via Fake Job Interviews

Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent access to infected machines.

Dark ReadingFeb 25, 20261m0
Industry News

Why 'Call This Number' TOAD Emails Beat Gateways

Dark Reading
Industry News

Why 'Call This Number' TOAD Emails Beat Gateways

Attackers are bypassing email gateways through telephone-oriented attack delivery (TOAD), in which the only email payload is a phone number.

Dark ReadingFeb 25, 20261m0
Industry News

'Richter Scale' Model Measures Magnitude of OT Cyber Incidents

Dark Reading
Industry News

'Richter Scale' Model Measures Magnitude of OT Cyber Incidents

ICS/OT experts have devised a scoring system for rating the severity and effects of cybersecurity events in operational technology environments.

Dark ReadingFeb 25, 20261m0
Vulnerabilities

CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems

CISA Alerts
Vulnerabilities

CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems

As a result of the malicious cyber activity and vulnerabilities involving Cisco SD-WAN systems, CISA has outlined requirements for FCEB agencies in Emergency Directive (ED) 26-03 to inventory Cisco SD-WAN systems, update them, and assess compromise.

CISA AlertsFeb 25, 20263m0
Vulnerabilities

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA Alerts
Vulnerabilities

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsFeb 25, 20261m0
$10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon
Graham Cluley
Industry News

$10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon

Did you watch this year's Super Bowl? If you did, maybe you're one of those who were sat at your sofa fuming about Ring camera's TV ad.

Graham CluleyFeb 25, 20263m0
Industry News

Operation Red Card 2.0 Leads to 651 Arrests in Africa

Dark Reading
Industry News

Operation Red Card 2.0 Leads to 651 Arrests in Africa

In the latest operation targeting cybercrime groups, African law enforcement agencies cooperated with Interpol and cybersecurity firms to recover more than $4.3 million.

Dark ReadingFeb 25, 20261m0
Industry News

Attackers Now Need Just 29 Minutes to Own a Network

Dark Reading
Industry News

Attackers Now Need Just 29 Minutes to Own a Network

Credential misuse, AI tools, and security blind spots help attackers move through breached networks faster than ever, CrowdStrike finds.

Dark ReadingFeb 24, 20261m0
Industry News

Lazarus Group Picks a New Poison: Medusa Ransomware

Dark Reading
Industry News

Lazarus Group Picks a New Poison: Medusa Ransomware

The North Korean threat group also leveraged Comebacker backdoor, Blindingcan RAT, and info stealer Infohook in its recent attacks.

Dark ReadingFeb 24, 20261m0