Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Industry News

CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

The Hacker News
Industry News

CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows - CVE-2026-21643 (CVSS score: 9.1) - An SQL injectio...

The Hacker NewsApr 14, 20261m1
Vulnerabilities

ISC Stormcast For Tuesday, April 14th, 2026 https://isc.sans.edu/podcastdetail/9890, (Tue, Apr 14th)

SANS ISC
Vulnerabilities

ISC Stormcast For Tuesday, April 14th, 2026 https://isc.sans.edu/podcastdetail/9890, (Tue, Apr 14th)

No description available.

SANS ISCApr 14, 20261m2
European Gym giant Basic-Fit data breach affects 1 million members
BleepingComputer
Malware & Threats

European Gym giant Basic-Fit data breach affects 1 million members

Dutch fitness giant Basic-Fit announced that hackers breached its systems and gained access to information belonging to a million of its customers.

BleepingComputerApr 13, 20263m2
Industry News

Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads

Dark Reading
Industry News

Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads

Security teams can't test distributed denial-of-service defenses in a vacuum. They need to test during periods of high demand, such as tax filing deadlines.

Dark ReadingApr 13, 20261m1
Industry News

CSA: CISOs Should Prepare for Post-Mythos Exploit Storm

Dark Reading
Industry News

CSA: CISOs Should Prepare for Post-Mythos Exploit Storm

Security experts warn of an "AI vulnerability storm" triggered by the introduction of Anthropic's Claude Mythos in a new paper from the Cloud Security Alliance (CSA).

Dark ReadingApr 13, 20261m1
Industry News

Adobe Patches Actively Exploited Zero-Day That Lingered for Months

Dark Reading
Industry News

Adobe Patches Actively Exploited Zero-Day That Lingered for Months

An attacker has been using maliciously crafted PDF files to exploit a zero-day in Adobe Acrobat and Reader for at least four months.

Dark ReadingApr 13, 20261m1
Stolen Rockstar Games analytics data leaked by extortion gang
BleepingComputer
Malware & Threats

Stolen Rockstar Games analytics data leaked by extortion gang

Rockstar Games has suffered a data breach linked to a recent security incident at Anodot, with the ShinyHunters extortion gang now leaking the stolen data on its data leak site.

BleepingComputerApr 13, 20263m2
Critical flaw in wolfSSL library enables forged certificate use
BleepingComputer
Malware & Threats

Critical flaw in wolfSSL library enables forged certificate use

A critical vulnerability in the wolfSSL SSL/TLS library can weaken security via improper verification of the hash algorithm or its size when checking Elliptic Curve Digital Signature Algorithm (ECDSA) signatures.

BleepingComputerApr 13, 20263m2
Industry News

Empty Attestations: OT Lacks the Tools for Cryptographic Readiness

Dark Reading
Industry News

Empty Attestations: OT Lacks the Tools for Cryptographic Readiness

OT asset owners are being asked by regulators to attest to their post-quantum cryptographic readiness without the appropriate tooling, resulting in paperwork dressed up to look like genuine security.

Dark ReadingApr 13, 20261m1
FBI takedown of W3LL phishing service leads to developer arrest
BleepingComputer
Malware & Threats

FBI takedown of W3LL phishing service leads to developer arrest

The FBI Atlanta Field Office and Indonesian authorities have dismantled the "W3LL" global phishing platform, seizing infrastructure and arresting the alleged developer in what is described as the first coordinated enforcement action between the United States and Indonesia targeting a phishin...

BleepingComputerApr 13, 20263m2
OpenAI rotates macOS certs after Axios attack hit code-signing workflow
BleepingComputer
Malware & Threats

OpenAI rotates macOS certs after Axios attack hit code-signing workflow

OpenAI is rotating potentially exposed macOS code-signing certificates after a GitHub Actions workflow executed a malicious Axios package during a recent supply chain attack.

BleepingComputerApr 13, 20264m2
New Booking.com data breach forces reservation PIN resets
BleepingComputer
Malware & Threats

New Booking.com data breach forces reservation PIN resets

Booking.com has confirmed via a statement to BleepingComputer that it has detected unauthorized access to its systems that has exposed sensitive reservation and user data.

BleepingComputerApr 13, 20263m2