Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Webinar Today: Agentic AI vs. Identity’s Last Mile Problem
SecurityWeek
Industry News

Webinar Today: Agentic AI vs. Identity’s Last Mile Problem

Join the webcast as we explore what Agentic AI can and cannot solve today, and real world breach scenarios linked to disconnected applications.

SecurityWeekApr 1, 20261m1
Vulnerabilities

TeamPCP Supply Chain Campaign: Update 005 - First Confirmed Victim Disclosure, Post-Compromise Cloud Enumeration Documented, and Axios Attribution Narrows, (Wed, Apr 1st)

SANS ISC
Vulnerabilities

TeamPCP Supply Chain Campaign: Update 005 - First Confirmed Victim Disclosure, Post-Compromise Cloud Enumeration Documented, and Axios Attribution Narrows, (Wed, Apr 1st)

This is the fifth update to the TeamPCP supply chain campaign threat intelligence report, "When the Security Scanner Became the Weapon" (v3.0, March 25, 2026). Update 004 covered developments through March 30, including the Databricks investigation, dual ransomware operations, and AstraZeneca dat...

SANS ISCApr 1, 20261m2
Block the Prompt, Not the Work: The End of "Doctor No"
The Hacker News
Industry News

Block the Prompt, Not the Work: The End of "Doctor No"

70% installed AI extensions after DeepSeek block at U.S. law firm, routing traffic to China servers, exposing compliance risk.

The Hacker NewsApr 1, 20265m1
Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures
The Hacker News
Industry News

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

Augmented Marauder targets Latin America and Europe since 2020, using dynamic PDF phishing to spread Casbaneiro via Horabot.

The Hacker NewsApr 1, 20263m1
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

CISA AlertsApr 1, 20261m2
Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass
The Hacker News
Industry News

Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass

WhatsApp VBS campaign began February 2026, abusing AWS and UAC bypass to gain persistent remote access.

The Hacker NewsApr 1, 20263m1
New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released
The Hacker News
Industry News

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

Chrome patches 21 flaws including exploited CVE-2026-5281 in Dawn, marking fourth zero-day fixed in 2026, reducing active attack risk.

The Hacker NewsApr 1, 20262m1
FBI warns against using Chinese mobile apps due to privacy risks
BleepingComputer
Malware & Threats

FBI warns against using Chinese mobile apps due to privacy risks

The U.S. Federal Bureau of Investigation (FBI) warned Americans against using foreign-developed mobile applications, particularly those created by Chinese developers.

BleepingComputerApr 1, 20263m3
3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)
The Hacker News
Industry News

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)

84% of attacks abuse legitimate tools across 700,000 incidents, expanding internal attack surfaces and evading detection defenses.

The Hacker NewsApr 1, 20264m1
Vulnerabilities

Malicious Script That Gets Rid of ADS, (Wed, Apr 1st)

SANS ISC
Vulnerabilities

Malicious Script That Gets Rid of ADS, (Wed, Apr 1st)

Today, most malware are called “fileless” because they try to reduce their footprint on the infected computer filesystem to the bare minimum. But they need to write something… think about persistence. They can use the registry as an alternative storage location.

SANS ISCApr 1, 20261m2
Industry News

Are We Training AI Too Late?

Dark Reading
Industry News

Are We Training AI Too Late?

Ask the Expert: Cybersecurity teams need to expand their field of view to include new, unique threat sources, rather than relying on past, proven threat actors.

Dark ReadingApr 1, 20261m1
Google fixes fourth Chrome zero-day exploited in attacks in 2026
BleepingComputer
Malware & Threats

Google fixes fourth Chrome zero-day exploited in attacks in 2026

Google has fixed the fourth Chrome vulnerability exploited in zero-day attacks since the start of the year.

BleepingComputerApr 1, 20263m3