Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations
BleepingComputer
Malware & Threats

Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations

Raw threat intel isn't enough without real-world context. Criminal IP has partnered with Securonix to integrate exposure-based intelligence into ThreatQ, automating analysis and speeding up investigations.

BleepingComputer6d ago4m3
China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists
The Hacker News
Industry News

China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists

China-linked hackers exploit Exchange flaws since Dec 2024 across 8 countries, enabling espionage and credential theft operations.

The Hacker News6d ago5m2
Microsoft fixes Remote Desktop warnings displaying incorrectly
BleepingComputer
Malware & Threats

Microsoft fixes Remote Desktop warnings displaying incorrectly

Microsoft has fixed a known issue causing newly introduced Windows security warnings to display incorrectly when opening Remote Desktop (.rdp) files.

BleepingComputer6d ago3m3
Industry News

Name That Toon: Mark of (Security) Progress

Dark Reading
Industry News

Name That Toon: Mark of (Security) Progress

Feeling creative? Have something to say about the last 20 years of cybersecurity? Our editors will award the best cybersecurity-related caption with a $20 gift card.

Dark Reading6d ago1m2
Industry News

20 Years in Cyber: Dark Reading Marks Milestone With Month of Special Coverage

Dark Reading
Industry News

20 Years in Cyber: Dark Reading Marks Milestone With Month of Special Coverage

On this day in 2006, Dark Reading went live. We have a celebration planned that spans our two decades of covering the industry, and you, dear readers, are invited.

Dark Reading6d ago1m2
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA Alerts6d ago1m1
Vulnerabilities

Careful Adoption of Agentic AI Services

CISA Alerts
Vulnerabilities

Careful Adoption of Agentic AI Services

This guidance discusses cybersecurity challenges and risks associated with the introduction of agentic AI into IT environments, as well as best practices for securing agentic AI systems.

CISA Alerts6d ago1m2
Two US Security Experts Sentenced to Prison for Helping Ransomware Gang
SecurityWeek
Industry News

Two US Security Experts Sentenced to Prison for Helping Ransomware Gang

Ryan Goldberg of Georgia and Kevin Martin of Texas were each sentenced to four years in prison.

SecurityWeek6d ago2m1
Microsoft now lets admins choose pre-installed Store apps to uninstall
BleepingComputer
Malware & Threats

Microsoft now lets admins choose pre-installed Store apps to uninstall

Microsoft has updated a Windows 11 in-box app removal policy introduced in October to include a dynamic list that lets IT admins choose which preinstalled Store apps to uninstall.

BleepingComputer6d ago3m3
Sophisticated Deep#Door Backdoor Enables Espionage, Disruption
SecurityWeek
Industry News

Sophisticated Deep#Door Backdoor Enables Espionage, Disruption

The stealthy Python-based backdoor framework deploys a persistent Windows implant likely designed for espionage.

SecurityWeek6d ago3m1
Top Five Sales Challenges Costing MSPs Cybersecurity Revenue
The Hacker News
Industry News

Top Five Sales Challenges Costing MSPs Cybersecurity Revenue

MSP sales gaps persist as 77% report low urgency and 66% SMBs cite cost, delaying cybersecurity adoption and revenue growth.

The Hacker News6d ago6m1
Cisco Releases Open Source Tool for AI Model Provenance 
SecurityWeek
Industry News

Cisco Releases Open Source Tool for AI Model Provenance 

The new kit aims to address risks related to poisoned models, regulatory issues, supply chain integrity, and incident response.

SecurityWeek6d ago3m1