Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account
The Hacker News
Industry News

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

Axios 1.14.1 and 0.30.4 injected malicious plain-crypto-js@4.2.1 after npm compromise on March 31, 2026, deploying cross-platform RAT malware.

The Hacker NewsMar 31, 20266m50
Vulnerabilities

ISC Stormcast For Tuesday, March 31st, 2026 https://isc.sans.edu/podcastdetail/9872, (Tue, Mar 31st)

SANS ISC
Vulnerabilities

ISC Stormcast For Tuesday, March 31st, 2026 https://isc.sans.edu/podcastdetail/9872, (Tue, Mar 31st)

No description available.

SANS ISCMar 31, 20261m2
Healthcare tech firm CareCloud says hackers stole patient data
BleepingComputer
Malware & Threats

Healthcare tech firm CareCloud says hackers stole patient data

Healthcare IT firm CareCloud has disclosed a data breach incident that exposed sensitive data and caused a network disruption lasting approximately eight hours.

BleepingComputerMar 30, 20263m2
Industry News

AI-Powered 'DeepLoad' Malware Steals Credentials, Evades Detection

Dark Reading
Industry News

AI-Powered 'DeepLoad' Malware Steals Credentials, Evades Detection

The massive amount of junk code that hides the malware's logic from security scans was almost certainly generated by AI, researchers say.

Dark ReadingMar 30, 20261m1
New RoadK1ll WebSocket implant used to pivot on breached networks
BleepingComputer
Malware & Threats

New RoadK1ll WebSocket implant used to pivot on breached networks

A newly identified malicious implant named RoadK1ll is enabling threat actors to quietly move from a compromised host to other systems on the network.

BleepingComputerMar 30, 20263m2
Industry News

AI-Driven Code Surge Is Forcing a Rethink of AppSec

Dark Reading
Industry News

AI-Driven Code Surge Is Forcing a Rethink of AppSec

In a conversation with Dark Reading’s Terry Sweeney, Black Duck CEO Jason Schmitt explains how AI is reshaping application security and why it must evolve to keep pace.

Dark ReadingMar 30, 20261m1
Critical Citrix NetScaler memory flaw actively exploited in attacks
BleepingComputer
Malware & Threats

Critical Citrix NetScaler memory flaw actively exploited in attacks

Hackers are exploiting a critical severity vulnerability, tracked as CVE-2026-3055, in Citrix  NetScaler ADC and NetScaler Gateway appliances to obtain sensitive data.

BleepingComputerMar 30, 20263m3
Industry News

F5 BIG-IP Vulnerability Reclassified as RCE, Under Exploitation

Dark Reading
Industry News

F5 BIG-IP Vulnerability Reclassified as RCE, Under Exploitation

CVE-2025-53521 was initially disclosed in October as a high-severity denial-of-service (DoS) flaw, but new information has revealed the bug is actually much more dangerous.

Dark ReadingMar 30, 20261m1
Industry News

Fortinet BIG-IP Vulnerability Reclassified as RCE, Under Exploitation

Dark Reading
Industry News

Fortinet BIG-IP Vulnerability Reclassified as RCE, Under Exploitation

CVE-2025-53521 was initially disclosed in October as a high-severity denial-of-service (DoS) flaw, but new information has revealed the bug is actually much more dangerous.

Dark ReadingMar 30, 20261m1
OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability
The Hacker News
Industry News

OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability

ChatGPT and Codex flaws patched Feb 2026 exposed DNS exfiltration and GitHub tokens, raising enterprise AI security risks.

The Hacker NewsMar 30, 20266m2
Industry News

Manufacturing and Healthcare Share Struggles with Passwords

Dark Reading
Industry News

Manufacturing and Healthcare Share Struggles with Passwords

The two key economic sectors struggle with security for a reason: Many insiders view access management as a roadblock, while attackers see it as a way in.

Dark ReadingMar 30, 20261m1
DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials
The Hacker News
Industry News

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

DeepLoad exploits ClickFix and WMI persistence to steal credentials, enabling stealth reinfection after three days.

The Hacker NewsMar 30, 20264m1