Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Microsoft fixes Classic Outlook bug causing email delivery issues
BleepingComputer
Malware & Threats

Microsoft fixes Classic Outlook bug causing email delivery issues

Microsoft has resolved a known issue that was preventing some Classic Outlook users from sending emails via Outlook.com.

BleepingComputerApr 6, 20262m2
Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations
The Hacker News
Industry News

Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations

Iran-linked attacks hit 300+ Israeli M365 orgs in March 2026, reviving ransomware campaigns and escalating regional cyber risks.

The Hacker NewsApr 6, 20264m1
Microsoft removes Support and Recovery Assistant from Windows
BleepingComputer
Malware & Threats

Microsoft removes Support and Recovery Assistant from Windows

Microsoft has deprecated and removed the Support and Recovery Assistant (SaRA) command-line utility from all in-support versions of Windows updates starting March 10.

BleepingComputerApr 6, 20263m2
Microsoft links Medusa ransomware affiliate to zero-day attacks
BleepingComputer
Malware & Threats

Microsoft links Medusa ransomware affiliate to zero-day attacks

Microsoft says that Storm-1175, a China-based financially motivated cybercriminal group known for deploying Medusa ransomware payloads, has been deploying n-day and zero-day exploits in high-velocity attacks.

BleepingComputerApr 6, 20263m2
Drift $280M crypto theft linked to 6-month in-person operation
BleepingComputer
Malware & Threats

Drift $280M crypto theft linked to 6-month in-person operation

The Drift Protocol says that the $280+ million hack it suffered last week was the result of a long-term, carefully planned operation that included building "a functioning operational presence inside the Drift ecosystem."

BleepingComputerApr 6, 20263m3
DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea
The Hacker News
Industry News

DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea

DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data exfiltration.

The Hacker NewsApr 6, 20264m1
CISA orders feds to patch Fortinet flaw exploited in attacks by Friday
BleepingComputer
Malware & Threats

CISA orders feds to patch Fortinet flaw exploited in attacks by Friday

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered federal agencies to secure FortiClient Enterprise Management Server (EMS) instances against an actively exploited vulnerability by Friday.

BleepingComputerApr 6, 20263m2
Google DeepMind Researchers Map Web Attacks Against AI Agents
SecurityWeek
Industry News

Google DeepMind Researchers Map Web Attacks Against AI Agents

Malicious web content can be used to manipulate, deceive, and exploit autonomous AI agents navigating the internet, Google DeepMind researchers show. The researchers have identified six types of attacks against AI agents that can be mounted via web content to inject malicious context and trigger ...

SecurityWeekApr 6, 20264m1
Industry News

Automated Credential Harvesting Campaign Exploits React2Shell Flaw

Dark Reading
Industry News

Automated Credential Harvesting Campaign Exploits React2Shell Flaw

An emerging threat cluster tracked as UAT-10608 is exploiting vulnerable Web-exposed Next.js apps and using an automated tool to exfiltrate credentials, secrets, and other system data.

Dark ReadingApr 6, 20261m1
Industry News

Shadow AI in Healthcare is Here to Stay

Dark Reading
Industry News

Shadow AI in Healthcare is Here to Stay

Medical professionals are not going to stop using AI tools to manage growing workloads. Organizations should prioritize bolstering security protocols to limit their blast radius.

Dark ReadingApr 6, 20261m1
Why Simple Breach Monitoring is No Longer Enough
BleepingComputer
Malware & Threats

Why Simple Breach Monitoring is No Longer Enough

Infostealers are harvesting credentials and session cookies at scale, bypassing traditional defenses. Lunar explains why simple breach monitoring alone can't keep up with modern credential-based attacks.

BleepingComputerApr 6, 20267m2
Industry News

OWASP GenAI Security Project Gets Update, New Tools Matrix

Dark Reading
Industry News

OWASP GenAI Security Project Gets Update, New Tools Matrix

In recognition of 21 generative AI risks, the standards groups recommends that companies take separate but linked approaches to defending GenAI and agentic AI systems.

Dark ReadingApr 6, 20261m1