Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Vulnerabilities

CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems

CISA Alerts
Vulnerabilities

CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems

As a result of the malicious cyber activity and vulnerabilities involving Cisco SD-WAN systems, CISA has outlined requirements for FCEB agencies in Emergency Directive (ED) 26-03 to inventory Cisco SD-WAN systems, update them, and assess compromise.

CISA AlertsFeb 25, 20263m8
Vulnerabilities

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA Alerts
Vulnerabilities

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsFeb 25, 20261m8
Industry News

'Richter Scale' Model Measures Magnitude of OT Cyber Incidents

Dark Reading
Industry News

'Richter Scale' Model Measures Magnitude of OT Cyber Incidents

ICS/OT experts have devised a scoring system for rating the severity and effects of cybersecurity events in operational technology environments.

Dark ReadingFeb 25, 20261m9
$10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon
Graham Cluley
High
Industry News
72/10

$10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon

Did you watch this year's Super Bowl? If you did, maybe you're one of those who were sat at your sofa fuming about Ring camera's TV ad.

Consumer TechnologySmart Home / IoT
Graham CluleyFeb 25, 20263m8
Industry News

Operation Red Card 2.0 Leads to 651 Arrests in Africa

Dark Reading
Industry News

Operation Red Card 2.0 Leads to 651 Arrests in Africa

In the latest operation targeting cybercrime groups, African law enforcement agencies cooperated with Interpol and cybersecurity firms to recover more than $4.3 million.

Dark ReadingFeb 25, 20261m8
Industry News

Attackers Now Need Just 29 Minutes to Own a Network

Dark Reading
Industry News

Attackers Now Need Just 29 Minutes to Own a Network

Credential misuse, AI tools, and security blind spots help attackers move through breached networks faster than ever, CrowdStrike finds.

Dark ReadingFeb 24, 20261m8
Industry News

Lazarus Group Picks a New Poison: Medusa Ransomware

Dark Reading
Critical
Industry News
92/10

Lazarus Group Picks a New Poison: Medusa Ransomware

The North Korean threat group also leveraged Comebacker backdoor, Blindingcan RAT, and info stealer Infohook in its recent attacks.

Lazarus Group (North Korea)GovernmentFinance
Dark ReadingFeb 24, 20261m8
Industry News

As Cybersecurity Firms Chase AI, VC Market Skyrockets

Dark Reading
Industry News

As Cybersecurity Firms Chase AI, VC Market Skyrockets

Investments in cybersecurity startups took off in 2025 as venture capital firms focused not just on AI-native tech but on talent as well.

Dark ReadingFeb 24, 20261m8
Vulnerabilities

InSAT MasterSCADA BUK-TS

CISA Alerts
Vulnerabilities

InSAT MasterSCADA BUK-TS

View CSAF

CISA AlertsFeb 24, 20264m9
Vulnerabilities

Schneider Electric EcoStruxure Building Operation Workstation

CISA Alerts
Vulnerabilities

Schneider Electric EcoStruxure Building Operation Workstation

View CSAF

CISA AlertsFeb 24, 202610m8
Vulnerabilities

Gardyn Home Kit

CISA Alerts
Vulnerabilities

Gardyn Home Kit

View CSAF

CISA AlertsFeb 24, 20264m8
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsFeb 24, 20261m8