Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Hims & Hers warns of data breach after Zendesk support ticket breach
BleepingComputer
Malware & Threats

Hims & Hers warns of data breach after Zendesk support ticket breach

Telehealth giant Hims & Hers Health is warning that it suffered a data breach after support tickets were stolen from a third-party customer service platform.

BleepingComputerApr 3, 20263m2
China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing
The Hacker News
Industry News

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 targeted European governments from mid-2025 using PlugX and OAuth abuse, enabling cyber espionage against EU and NATO entities.

The Hacker NewsApr 3, 20265m1
Industry News

Apple Breaks Precedent, Patches DarkSword for iOS 18

Dark Reading
Industry News

Apple Breaks Precedent, Patches DarkSword for iOS 18

Even organizations with users unwilling or unable to adopt iOS 26 can now protect themselves from a severe mobile OS-cracking tool.

Dark ReadingApr 3, 20261m1
Die Linke German political party confirms data stolen by Qilin ransomware
BleepingComputer
Malware & Threats

Die Linke German political party confirms data stolen by Qilin ransomware

The Qilin ransomware group has claimed responsibility for an attack against Die Linke ('The Left'), forcing an IT systems outage at the political party, and threatening sensitive data leak.

BleepingComputerApr 3, 20262m2
Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
The Hacker News
Industry News

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Cookie-gated PHP web shells enable persistent Linux RCE via cron-based re-creation, reducing detection in routine traffic logs.

The Hacker NewsApr 3, 20263m1
Industry News

Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

Dark Reading
Industry News

Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

As organizations disclose breaches tied to TeamPCP's supply chain attacks, ShinyHunters and Lapsus$ are getting involved, taking credit, and creating a murky situation for enterprises.

Dark ReadingApr 3, 20261m1
Evolution of Ransomware: Multi-Extortion Ransomware Attacks
BleepingComputer
Malware & Threats

Evolution of Ransomware: Multi-Extortion Ransomware Attacks

Multi-extortion ransomware relies on stolen data to pressure victims with public leaks. Penta Security explains how its D.AMO platform keeps exfiltrated files encrypted and useless to attackers.

BleepingComputerApr 3, 20264m2
Industry News

Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication

Dark Reading
Industry News

Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication

"Skull vibration harmonics generated by vital signs" can be used to sign in to VR, AR, and MR headsets, according to emerging research.

Dark ReadingApr 3, 20261m1
Vulnerabilities

TeamPCP Supply Chain Campaign: Update 006 - CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000+ SaaS Environments, (Fri, Apr 3rd)

SANS ISC
Vulnerabilities

TeamPCP Supply Chain Campaign: Update 006 - CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000+ SaaS Environments, (Fri, Apr 3rd)

This is the sixth update to the TeamPCP supply chain campaign threat intelligence report,&#;x26;#;xc2;&#;x26;#;xa0;"When the Security Scanner Became the Weapon"&#;x26;#;xc2;&#;x26;#;xa0;(v3.0, March 25, 2026).&#;x26;#;xc2;&#;x26;#;xa0;Update 005&#;x26;#;xc2;&#;x26;#;xa0;covered developments throu...

SANS ISCApr 3, 20261m2
Industry News

Source Code Leaks Highlight Lack of Supply Chain Oversight

Dark Reading
Industry News

Source Code Leaks Highlight Lack of Supply Chain Oversight

Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer.

Dark ReadingApr 3, 20261m1
Industry News

Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain

Dark Reading
Industry News

Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain

The rebuilt Chainguard platform adds deeper security designed to continuously reconcile open-source artifacts across containers, libraries, Actions and skills.

Dark ReadingApr 3, 20261m1
TrueConf Zero-Day Exploited in Asian Government Attacks
SecurityWeek
Industry News

TrueConf Zero-Day Exploited in Asian Government Attacks

A Chinese threat actor exploited the video conferencing platform to perform reconnaissance, escalate privileges, and execute additional payloads.

SecurityWeekApr 3, 20263m1