Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns
The Hacker News
Industry News

UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns

UAT-10362 spear-phishing targets Taiwanese NGOs in October 2025, deploying LucidRook malware for data exfiltration and stealthy persistence.

The Hacker NewsApr 9, 20263m1
Smart Slider updates hijacked to push malicious WordPress, Joomla versions
BleepingComputer
Malware & Threats

Smart Slider updates hijacked to push malicious WordPress, Joomla versions

Hackers hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla, and pushed a malicious version with multiple backdoors.

BleepingComputerApr 9, 20264m2
When attackers already have the keys, MFA is just another door to open
BleepingComputer
Malware & Threats

When attackers already have the keys, MFA is just another door to open

Stolen credentials turn authentication systems into the attack surface. Token shows how wearable biometric authentication verifies the user—not the session—blocking phishing relays and MFA bypass.

BleepingComputerApr 9, 202610m2
Apple Intelligence AI Guardrails Bypassed in New Attack
SecurityWeek
Industry News

Apple Intelligence AI Guardrails Bypassed in New Attack

RSAC researchers hacked Apple Intelligence using the Neural Exect method and Unicode manipulation.

SecurityWeekApr 9, 20263m1
Can we Trust AI? No – But Eventually We Must
SecurityWeek
Industry News

Can we Trust AI? No – But Eventually We Must

From hallucinations and bias to model collapse and adversarial abuse, today’s AI is built on probability rather than truth, yet enterprises are deploying it at speed without fully understanding the risks.

SecurityWeekApr 9, 202616m1
Industry News

Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?

Dark Reading
Industry News

Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?

Its Mythos Preview model, which can allegedly find and exploit critical zero-days, also comes with certain controls, the vendor said.

Dark ReadingApr 9, 20261m1
ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories
The Hacker News
Industry News

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

This week in cybersecurity: botnets, RCE flaws, AI-driven attacks, stealers, and more. Fast, no-fluff roundup.

The Hacker NewsApr 9, 202616m1
Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access
SecurityWeek
Industry News

Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access

Dozens of such keys can be extracted from apps’ decompiled code to gain access to all Gemini endpoints.

SecurityWeekApr 9, 20263m1
Webinar: From noise to signal - What threat actors are targeting next
BleepingComputer
Malware & Threats

Webinar: From noise to signal - What threat actors are targeting next

Threat actors often signal their intentions before launching attacks, from dark web chatter to access-broker listings and credential requests. Join our upcoming webinar with Flare Systems to learn how to turn those early warning signs into proactive defensive action before an intrusion begins.

BleepingComputerApr 9, 20262m2
Vulnerabilities

GPL Odorizers GPL750

CISA Alerts
Vulnerabilities

GPL Odorizers GPL750

View CSAF

CISA AlertsApr 9, 20263m2
Vulnerabilities

Contemporary Controls BASC 20T

CISA Alerts
Vulnerabilities

Contemporary Controls BASC 20T

View CSAF

CISA AlertsApr 9, 20263m2
Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities
SecurityWeek
Industry News

Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities

The bugs could allow attackers to modify protected resources and escalate their privileges to administrator.

SecurityWeekApr 9, 20262m1