Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Spain dismantles major $4.7M manga piracy platform, arrests four
BleepingComputer
Malware & Threats

Spain dismantles major $4.7M manga piracy platform, arrests four

The Spanish police have dismantled the largest Spanish-language manga piracy platform, operating since 2014, with millions of monthly users from around the globe.

BleepingComputerApr 22, 20263m2
Industry News

DPRK Fake Job Scams Self-Propagate in 'Contagious Interview'

Dark Reading
Industry News

DPRK Fake Job Scams Self-Propagate in 'Contagious Interview'

A compromised developer's repository serves as a worm-like infection vector to spread remote access Trojans (RATs) and other malware.

Dark ReadingApr 22, 20261m2
After Bluesky, Mastodon Targeted in DDoS Attack
SecurityWeek
Industry News

After Bluesky, Mastodon Targeted in DDoS Attack

The DDoS attack caused a major outage, but Mastodon mitigated it within a few hours.

SecurityWeekApr 22, 20262m2
Industry News

Electricity Is a Growing Area of Cyber Risk

Dark Reading
Industry News

Electricity Is a Growing Area of Cyber Risk

IT has long been concerned about ensuring systems receive the right amount of electricity. Cyberattackers are realizing they can manipulate voltage fluctuations for their purposes, too.

Dark ReadingApr 22, 20261m2
Industry News

Electricity Is a Growing Area of Cyber Risk

Dark Reading
Industry News

Electricity Is a Growing Area of Cyber Risk

IT has long been concerned about ensuring systems receive the right amount of electricity. Cyberattackers are realizing they can manipulate voltage fluctuations for their purposes, too.

Dark ReadingApr 22, 20261m2
Inside Caller-as-a-Service Fraud: The Scam Economy Has a Hiring Process
BleepingComputer
Malware & Threats

Inside Caller-as-a-Service Fraud: The Scam Economy Has a Hiring Process

Fraud operations now operate like call centers, complete with hiring, training, and performance tracking. Flare reveals how cybercriminals manage "Caller-as-a-Service" operations like a professional sales team.

BleepingComputerApr 22, 20267m2
New npm supply-chain attack self-spreads to steal auth tokens
BleepingComputer
Malware & Threats

New npm supply-chain attack self-spreads to steal auth tokens

A new supply chain attack targeting the Node Package Manager (npm) ecosystem is stealing developer credentials and attempting to spread through packages published from compromised accounts.

BleepingComputerApr 22, 20263m2
Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief Says
SecurityWeek
Industry News

Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief Says

British businesses need to prepare themselves to defend against cyberattacks because the U.K. could be targeted “at scale,” if it became involved in an international conflict.

SecurityWeekApr 22, 20264m2
Microsoft Teams to get efficiency mode on PCs with limited resources
BleepingComputer
Malware & Threats

Microsoft Teams to get efficiency mode on PCs with limited resources

Microsoft is preparing to roll out a new Efficiency Mode for Microsoft Teams for systems with limited CPU and memory resources to improve app responsiveness.

BleepingComputerApr 22, 20263m2
New Wiper Malware Targeted Venezuelan Energy Sector Prior to US Intervention 
SecurityWeek
Industry News

New Wiper Malware Targeted Venezuelan Energy Sector Prior to US Intervention 

Dubbed Lotus Wiper, the malware targets recovery mechanisms, overwrites drives, and systematically deletes files.

SecurityWeekApr 22, 20263m2
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsApr 22, 20261m2
Mirai Botnet Targets Flaw in Discontinued D-Link Routers
SecurityWeek
Industry News

Mirai Botnet Targets Flaw in Discontinued D-Link Routers

The exploitation of the command injection vulnerability started one year after public disclosure and PoC exploit code publication.

SecurityWeekApr 22, 20262m2