Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Vulnerabilities

Everon OCPP Backends

CISA Alerts
Vulnerabilities

Everon OCPP Backends

View CSAF

CISA AlertsMar 3, 20264m8
Vulnerabilities

Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module

CISA Alerts
Vulnerabilities

Mitsubishi Electric MELSEC iQ-F Series EtherNet/IP module and Ethernet module

View CSAF

CISA AlertsMar 3, 20266m8
Vulnerabilities

Labkotec LID-3300IP

CISA Alerts
Vulnerabilities

Labkotec LID-3300IP

View CSAF

CISA AlertsMar 3, 20263m8
Vulnerabilities

Mobiliti e-mobi.hu

CISA Alerts
Vulnerabilities

Mobiliti e-mobi.hu

View CSAF

CISA AlertsMar 3, 20265m8
Vulnerabilities

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA Alerts
Vulnerabilities

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsMar 3, 20261m8
Vulnerabilities

Hitachi Energy Relion REB500 Product

CISA Alerts
Vulnerabilities

Hitachi Energy Relion REB500 Product

View CSAF

CISA AlertsMar 3, 20265m8
Vulnerabilities

ePower epower.ie

CISA Alerts
Vulnerabilities

ePower epower.ie

View CSAF

CISA AlertsMar 3, 20264m8
Vulnerabilities

Hitachi Energy RTU500 Product

CISA Alerts
Vulnerabilities

Hitachi Energy RTU500 Product

View CSAF

CISA AlertsMar 3, 20268m8
Vulnerabilities

Portwell Engineering Toolkits

CISA Alerts
High
Vulnerabilities
78/10

Portwell Engineering Toolkits

View CSAF

Critical ManufacturingEnergy
CISA AlertsMar 3, 20263m8
Industry News

As War Continues, Pro-Iranian Actors Launch Barrage of Cyberattacks

Dark Reading
Industry News

As War Continues, Pro-Iranian Actors Launch Barrage of Cyberattacks

Iran and its supporters have taken to cyberspace to retaliate for US-Israeli military action, with an aim to cause economic and physical disruption.

Dark ReadingMar 3, 20261m8
AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged
The Hacker News
Industry News

AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged

70% of enterprises run AI agents, but weak IAM governance risks identity “dark matter” and cross-cloud exposure, survey finds.

The Hacker NewsMar 3, 20268m8
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
The Hacker News
Industry News

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

Starkiller phishing suite uses live reverse proxying to bypass MFA, while attackers abuse OAuth device codes to hijack Microsoft 365 accounts.

The Hacker NewsMar 3, 20264m8