Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks
SecurityWeek
Industry News

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

Threat actors are reusing Tycoon 2FA tools across other phishing kits following the platform’s disruption.

SecurityWeekApr 18, 20263m1
$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims
The Hacker News
Industry News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

$13.74M stolen from Grinex on April 15, 2026 after sanctions, disrupting Russia-linked evasion networks.

The Hacker NewsApr 18, 20264m1
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet
The Hacker News
Industry News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

CVE-2024-3721 and CVE-2023-33538 exploited in TBK DVRs and EoL TP-Link routers, enabling Mirai variants and DDoS risk.

The Hacker NewsApr 18, 20264m1
Industry News

How NIST's Cutback of CVE Handling Impacts Cyber Teams

Dark Reading
Industry News

How NIST's Cutback of CVE Handling Impacts Cyber Teams

Industry and ad hoc coalitions appear poised to help fill the gap created by NIST's decision to cut back on CVE data enrichment.

Dark ReadingApr 17, 20261m1
Payouts King ransomware uses QEMU VMs to bypass endpoint security
BleepingComputer
Malware & Threats

Payouts King ransomware uses QEMU VMs to bypass endpoint security

The Payouts King ransomware is using the QEMU emulator as a reverse SSH backdoor to run hidden virtual machines on compromised systems and bypass endpoint security.

BleepingComputerApr 17, 20264m2
Industry News

Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing

Dark Reading
Industry News

Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing

In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate new-device login flow.

Dark ReadingApr 17, 20261m1
White House Chief of Staff to Meet With Anthropic CEO Over Its New AI Technology
SecurityWeek
Industry News

White House Chief of Staff to Meet With Anthropic CEO Over Its New AI Technology

A White House official said the administration is engaging with advanced AI labs about their models and the security of software.

SecurityWeekApr 17, 20265m1
Grinex exchange blames "Western intelligence" for $13.7M crypto hack
BleepingComputer
Malware & Threats

Grinex exchange blames "Western intelligence" for $13.7M crypto hack

Kyrgyzstan-based cryptocurrency exchange Grinex has suspended its operations after suffering a $13.7 million hack attributed to Western intelligence agencies.

BleepingComputerApr 17, 20263m2
CoChat Launches AI Collaboration Platform to Combat Shadow AI
SecurityWeek
Industry News

CoChat Launches AI Collaboration Platform to Combat Shadow AI

CoChat is fundamentally an AI collaboration platform designed for teamwork and to bring visibility and governance into enterprise AI shadows.

SecurityWeekApr 17, 20265m1
Industry News

Every Old Vulnerability Is Now an AI Vulnerability

Dark Reading
Industry News

Every Old Vulnerability Is Now an AI Vulnerability

AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones.

Dark ReadingApr 17, 20261m1
Inside an Underground Guide: How Threat Actors Vet Stolen Credit Card Shops
BleepingComputer
Malware & Threats

Inside an Underground Guide: How Threat Actors Vet Stolen Credit Card Shops

In cybercrime markets, trust isn't assumed, it's verified. Flare reveals how underground guides teach actors to evaluate carding shops based on data quality, reputation, and survivability.

BleepingComputerApr 17, 20268m2
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched
The Hacker News
Industry News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Three Defender zero-days exploited since April 10, 2026, enabling privilege escalation and DoS, forcing isolation of affected systems.

The Hacker NewsApr 17, 20262m1