Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

New Microsoft Defender “RedSun” zero-day PoC grants SYSTEM privileges
BleepingComputer
Malware & Threats

New Microsoft Defender “RedSun” zero-day PoC grants SYSTEM privileges

A researcher known as "Chaotic Eclipse" has published a proof-of-concept exploit for a second Microsoft Defender zero-day, dubbed "RedSun," in the past two weeks, protesting how the company works with cybersecurity researchers.

BleepingComputerApr 16, 20264m2
Industry News

North Korea Uses ClickFix to Target macOS Users' Data

Dark Reading
Industry News

North Korea Uses ClickFix to Target macOS Users' Data

Sapphire Sleet uses fake job offers and phony Zoom updates to deliver ClickFix attacks that steal credentials and sensitive data from Macs.

Dark ReadingApr 16, 20261m1
Industry News

'Harmless' Global Adware Transforms Into an AV Killer

Dark Reading
Industry News

'Harmless' Global Adware Transforms Into an AV Killer

A benign looking update Dragon Boss pushed out in March 2025 established persistence via scheduled tasks and arranged for future payloads to be excluded from Windows Defender.

Dark ReadingApr 16, 20261m1
Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic
The Hacker News
Industry News

Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

PowMix targets Czech workforce since Dec 2025 using jittered C2 and ZIP phishing, enabling stealthy remote access and persistence.

The Hacker NewsApr 16, 20264m1
Government Can’t Win the Cyber War Without the Private Sector
SecurityWeek
Industry News

Government Can’t Win the Cyber War Without the Private Sector

Securing national resilience now depends on faster, deeper partnerships with the private sector.

SecurityWeekApr 16, 20265m1
Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face
BleepingComputer
Malware & Threats

Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

Hackers are exploiting a critical vulnerability in Marimo reactive Python notebook to deploy a new variant of NKAbuse malware hosted on Hugging Face Spaces.

BleepingComputerApr 16, 20263m2
Industry News

Sometimes changing the password on your email mailbox isn’t enough

Graham Cluley
Industry News

Sometimes changing the password on your email mailbox isn’t enough

Have you ever taken a look at your Microsoft 365 mailbox rules? If not, it might be worth a few minutes of your time. Because newly released research reveals that hackers may already have beaten you to it. Read more in my article on the Fortra blog.

Graham CluleyApr 16, 20261m1
Industry News

Two-Factor Authentication Breaks Free from the Desktop

Dark Reading
Industry News

Two-Factor Authentication Breaks Free from the Desktop

Threat actors know how to bypass security systems outside of traditional IT environments. Implementing 2FA could provide a needed extra security barrier in the physical world.

Dark ReadingApr 16, 20261m1
Google expands Gemini AI use to fight malicious ads on its platform
BleepingComputer
Malware & Threats

Google expands Gemini AI use to fight malicious ads on its platform

Google says it is increasingly using its Gemini AI models to detect and block harmful ads on its advertising platforms, as scammers and threat actors continue to evolve their tactics to evade detection.

BleepingComputerApr 16, 20263m2
Industry News

Microsoft's Original Windows Secure Boot Certificate Is Expiring

Dark Reading
Industry News

Microsoft's Original Windows Secure Boot Certificate Is Expiring

The Secure Boot refresh is one of the largest coordinated security maintenance efforts across the Windows ecosystem, Microsoft said. Update those PCs soon.

Dark ReadingApr 16, 20261m1
OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal
SecurityWeek
Industry News

OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal

GPT‑5.4‑Cyber is a model fine-tuned for defenders, lowering boundaries for legitimate cybersecurity work.

SecurityWeekApr 16, 20262m1
New ATHR vishing platform uses AI voice agents for automated attacks
BleepingComputer
Malware & Threats

New ATHR vishing platform uses AI voice agents for automated attacks

A new cybercrime platform called ATHR can harvest credentials via fully automated voice phishing attacks that use both human operators and AI agents for the social engineering phase.

BleepingComputerApr 16, 20264m2