Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Iran-Linked Hackers Disrupt US Critical Infrastructure via PLC Attacks
SecurityWeek
Industry News

Iran-Linked Hackers Disrupt US Critical Infrastructure via PLC Attacks

Federal agencies warn attackers are manipulating PLC and SCADA systems across multiple sectors, triggering operational disruptions and raising concerns over broader OT targeting.

SecurityWeekApr 8, 20264m1
Vulnerabilities

ISC Stormcast For Wednesday, April 8th, 2026 https://isc.sans.edu/podcastdetail/9884, (Wed, Apr 8th)

SANS ISC
Vulnerabilities

ISC Stormcast For Wednesday, April 8th, 2026 https://isc.sans.edu/podcastdetail/9884, (Wed, Apr 8th)

No description available.

SANS ISCApr 8, 20261m2
Hackers exploit critical flaw in Ninja Forms WordPress plugin
BleepingComputer
Malware & Threats

Hackers exploit critical flaw in Ninja Forms WordPress plugin

A critical vulnerability in the Ninja Forms File Uploads premium add-on for WordPress allows uploading arbitrary files without authentication, which can lead to remote code execution.

BleepingComputerApr 7, 20263m2
FBI: Americans lost a record $21 billion to cybercrime last year
BleepingComputer
Malware & Threats

FBI: Americans lost a record $21 billion to cybercrime last year

U.S. victims lost nearly $21 billion to cyber-enabled crimes last year, driven primarily by investment scams, business email compromise, tech support fraud, and data breaches, the Federal Bureau of Investigation says.

BleepingComputerApr 7, 20263m2
Industry News

Storm-1175 Deploys Medusa Ransomware at 'High Velocity'

Dark Reading
Industry News

Storm-1175 Deploys Medusa Ransomware at 'High Velocity'

Microsoft says the financially motivated cybercrime group has exploited N-day and zero-day vulnerabilities in campaigns predicated on speed.

Dark ReadingApr 7, 20261m1
Industry News

Grafana Patches AI Bug That Could Have Leaked User Data

Dark Reading
Industry News

Grafana Patches AI Bug That Could Have Leaked User Data

By hiding malicious instructions on an attacker-controlled Web page, AI could ingest orders as benign and return sensitive data to the attacker's server.

Dark ReadingApr 7, 20261m1
Snowflake customers hit in data theft attacks after SaaS integrator breach
BleepingComputer
Malware & Threats

Snowflake customers hit in data theft attacks after SaaS integrator breach

Over a dozen companies have suffered data theft attacks after a SaaS integration provider was breached and authentication tokens stolen.

BleepingComputerApr 7, 20263m2
Anthropic Unveils ‘Claude Mythos’ — A Cybersecurity Breakthrough That Could Also Supercharge Attacks
SecurityWeek
Industry News

Anthropic Unveils ‘Claude Mythos’ — A Cybersecurity Breakthrough That Could Also Supercharge Attacks

New AI model drives Project Glasswing, a effort to secure critical software before advanced capabilities fall into the wrong hands.

SecurityWeekApr 7, 20266m2
Vulnerabilities

A Little Bit Pivoting: What Web Shells are Attackers Looking for?, (Tue, Apr 7th)

SANS ISC
Vulnerabilities

A Little Bit Pivoting: What Web Shells are Attackers Looking for?, (Tue, Apr 7th)

Webshells remain a popular method for attackers to maintain persistence on a compromised web server. Many "arbitrary file write" and "remote code execution" vulnerabilities are used to drop small files on systems for later execution of additional payloads. The names of these files keep changing a...

SANS ISCApr 7, 20261m2
US warns of Iranian hackers targeting critical infrastructure
BleepingComputer
Malware & Threats

US warns of Iranian hackers targeting critical infrastructure

Iranian-linked hackers are targeting Internet-exposed Rockwell/Allen-Bradley programmable logic controllers (PLCs) on the networks of U.S. critical infrastructure organizations.

BleepingComputerApr 7, 20263m2
Russia Hacked Routers to Steal Microsoft Office Tokens
Krebs on Security
Data Breaches

Russia Hacked Routers to Steal Microsoft Office Tokens

Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens…

Krebs on SecurityApr 7, 20264m2
Max severity Flowise RCE vulnerability now exploited in attacks
BleepingComputer
Malware & Threats

Max severity Flowise RCE vulnerability now exploited in attacks

Hackers are exploiting a maximum-severity vulnerability, tracked as CVE-2025-59528, in the open-source platform Flowise for building custom LLM apps and agentic systems to execute arbitrary code.

BleepingComputerApr 7, 20263m2