Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Vulnerabilities

Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning [Guest Diary], (Wed, Mar 4th)

SANS ISC
Vulnerabilities

Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning [Guest Diary], (Wed, Mar 4th)

[This is a Guest Diary by Joseph Gruen, an ISC intern as part of the SANS.edu BACS program]

SANS ISCMar 5, 20261m8
Smashing Security podcast #457: How a cybersecurity boss framed his own employee
Graham Cluley
Industry News

Smashing Security podcast #457: How a cybersecurity boss framed his own employee

When a top cybersecurity firm discovered it had a leak, you would expect the FBI to be called. Instead, the person put in charge of the investigation was the…

Graham CluleyMar 5, 20263m8
Industry News

VMware Aria Operations Bug Exploited, Cloud Resources at Risk

Dark Reading
Industry News

VMware Aria Operations Bug Exploited, Cloud Resources at Risk

Exploitation of the command injection flaw in VMware Aria Operations could grant an attacker broad acess to victims' cloud environments.

Dark ReadingMar 4, 20261m8
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
The Hacker News
Industry News

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

149 hacktivist attacks hit 110 organizations across 16 countries after Middle East conflict, targeting governments, infrastructure, & telecom sectors.

The Hacker NewsMar 4, 20266m8
Industry News

Stranger Things Meets Cybersecurity: Lessons from the Hive Mind

Dark Reading
Industry News

Stranger Things Meets Cybersecurity: Lessons from the Hive Mind

Events and concepts from the Stranger Things television series illustrate how enterprises can defend their networks and stay "right side up."

Dark ReadingMar 4, 20261m8
Industry News

Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate

Dark Reading
Industry News

Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate

Dark Reading Confidential Episode 15: Interpol relied on Will Thomas and team to help break up a sprawling cybercrime ring, leading to the arrest of 574 suspects, the recovery of more than $3 million, and the decryption of six malware variants. Here's his story.

Dark ReadingMar 4, 20261m8
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
The Hacker News
Industry News

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

Google uncovered Coruna iOS exploit kit with 23 exploits across five chains targeting iPhones running iOS 13–17.2.1.

The Hacker NewsMar 4, 20266m9
New RFP Template for AI Usage Control and AI Governance 
The Hacker News
Industry News

New RFP Template for AI Usage Control and AI Governance 

New RFP guide helps CISOs evaluate AI governance tools, focusing on interaction-level security and vendor accountability.

The Hacker NewsMar 4, 20264m8
Industry News

China's Silver Dragon Razes Governments in EU, SE Asia

Dark Reading
Industry News

China's Silver Dragon Razes Governments in EU, SE Asia

The emerging actor, part of the APT41 nexus, gains initial access via phishing, and uses legitimate network services to obscure cyber espionage activities.

Dark ReadingMar 4, 20261m8
Vulnerabilities

Want More XWorm?, (Wed, Mar 4th)

SANS ISC
Vulnerabilities

Want More XWorm?, (Wed, Mar 4th)

And another XWorm[1] wave in the wild! This malware family is not new and heavily spread but delivery techniques always evolve and deserve to be described to show you how threat actors can be imaginative! This time, we are facing another piece of multi-technology malware.

SANS ISCMar 4, 20261m8
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
The Hacker News
Industry News

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

Malicious Packagist Laravel packages install a cross-platform RAT enabling remote shell access and system reconnaissance via C2 server.

The Hacker NewsMar 4, 20263m8
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
The Hacker News
Industry News

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

Researchers link Silver Dragon APT to APT41 after attacks on government entities using Cobalt Strike, DNS tunneling, and Google Drive-based C2.

The Hacker NewsMar 4, 20265m8