Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

MuddyWater hackers use Chaos ransomware as a decoy in attacks
BleepingComputer
Malware & Threats

MuddyWater hackers use Chaos ransomware as a decoy in attacks

The MuddyWater Iranian hackers disguised their operations as a Chaos ransomware attack, relying on  Microsoft Teams social engineering to gain access and establish persistence.

BleepingComputer1d ago3m2
Iranian APT Intrusion Masquerades as Chaos Ransomware Attack
SecurityWeek
Industry News

Iranian APT Intrusion Masquerades as Chaos Ransomware Attack

Likely perpetrated by MuddyWater, the attack combined social engineering, persistence, credential harvesting, and data theft.

SecurityWeek1d ago3m2
MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack
The Hacker News
Industry News

MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack

MuddyWater used Teams phishing in 2026 to steal credentials, enabling stealthy data exfiltration and persistence without encryption.

The Hacker News1d ago7m1
Webinar: Why network incidents escalate and how to fix response gaps
BleepingComputer
Malware & Threats

Webinar: Why network incidents escalate and how to fix response gaps

Most network incidents don't escalate due to a lack of alerts; they escalate when response breaks down. This webinar explores how to fix gaps in triage, enrichment, and coordination.

BleepingComputer1d ago2m2
The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Open
The Hacker News
Industry News

The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Open

CyberStars Awards 2026 launched as a global program recognizing cybersecurity excellence across products, companies, and professionals.

The Hacker News1d ago3m2
Industry News

From Stuxnet to ChatGPT: 20 News Events That Shaped Cyber

Dark Reading
Industry News

From Stuxnet to ChatGPT: 20 News Events That Shaped Cyber

As part of Dark Reading's 20th anniversary celebration, its staff looks back on 20 of the biggest newmaking events from the past two decades that shaped our industry and the risk landscape for today's security teams.

Dark Reading1d ago1m6
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA Alerts1d ago1m1
Romanian Extradited to US for Role in Hacking Scheme 17 Years Ago
SecurityWeek
Industry News

Romanian Extradited to US for Role in Hacking Scheme 17 Years Ago

Gavril Sandu, 53, was indicted in 2017, but was arrested and extradited to the United States only in 2026.

SecurityWeek1d ago2m2
Your AI Agents Are Already Inside the Perimeter. Do You Know What They're Doing?
The Hacker News
Industry News

Your AI Agents Are Already Inside the Perimeter. Do You Know What They're Doing?

AI agents outpace IAM governance as 50% identity activity stays unseen, increasing enterprise security and compliance risks.

The Hacker News1d ago7m2
Industry News

Attacks Abuse Windows Phone Link to Steal Texts & Bypass 2FA

Dark Reading
Industry News

Attacks Abuse Windows Phone Link to Steal Texts & Bypass 2FA

In hard-to-detect attacks, hackers are dropping the CloudZ RAT and a fresh plugin, Pheno, to hijack the Windows-based bridge between PCs and smartphones.

Dark Reading1d ago1m1
CISA: Critical Infrastructure Must Master Isolation, Recovery
SecurityWeek
Industry News

CISA: Critical Infrastructure Must Master Isolation, Recovery

The agency has issued guidance to help critical infrastructure operators prepare for cyberattacks by foreign threat actors.

SecurityWeek1d ago2m2
Sophisticated Quasar Linux RAT Targets Software Developers
SecurityWeek
Industry News

Sophisticated Quasar Linux RAT Targets Software Developers

The persistent, evasive implant provides remote access, surveillance, and credential exfiltration capabilities.

SecurityWeek1d ago3m2