Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Cisco Patches Multiple Vulnerabilities in IOS Software
SecurityWeek
High
Industry News
72/10

Cisco Patches Multiple Vulnerabilities in IOS Software

The high- and medium-severity flaws could lead to denial-of-service, secure boot bypass, information disclosure, and privilege escalation.

TelecommunicationsInformation Technology
SecurityWeekMar 26, 20262m2
Industry News

Intermediaries Driving Global Spyware Market Expansion

Dark Reading
High
Industry News
78/10

Intermediaries Driving Global Spyware Market Expansion

Third-party resellers and brokers foil transparency efforts and allow spyware to spread despite government restrictions, a study finds.

GovernmentDefense
Dark ReadingMar 26, 20261m1
Vulnerabilities

PTC Windchill Product Lifecycle Management

CISA Alerts
Critical
Vulnerabilities
98/10

PTC Windchill Product Lifecycle Management

View CSAF

Critical ManufacturingIndustrial Control Systems
CISA AlertsMar 26, 20265m2
Vulnerabilities

CISA Adds One Known Exploited Vulnerability to Catalog

CISA Alerts
Critical
Vulnerabilities
88/10

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

GovernmentFederal Agencies
CISA AlertsMar 26, 20261m2
Vulnerabilities

OpenCode Systems OC Messaging and USSD Gateway

CISA Alerts
High
Vulnerabilities
74/10

OpenCode Systems OC Messaging and USSD Gateway

View CSAF

Communications
CISA AlertsMar 26, 20263m2
Vulnerabilities

WAGO GmbH & Co. KG Industrial Managed Switches

CISA Alerts
Critical
Vulnerabilities
98/10

WAGO GmbH & Co. KG Industrial Managed Switches

An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface, leading to full compromise of the device.

Commercial FacilitiesCritical Manufacturing
CISA AlertsMar 26, 20269m4
Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception
The Hacker News
High
Industry News
78/10

Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception

81% of attacks are malware-free as AI-driven mimicry hides threats in trusted systems, increasing detection difficulty and risk.

Financial ServicesTechnology
The Hacker NewsMar 26, 20267m1
Suspected RedLine infostealer malware admin extradited to US
BleepingComputer
Critical
Malware & Threats
88/10

Suspected RedLine infostealer malware admin extradited to US

An Armenian suspect was extradited to the United States to face criminal charges for allegedly helping manage RedLine, one of the most prolific infostealer malware operations in recent years.

RedLine (Hambardzum Minasyan, Maxim Alexandrovich Rudometov)Financial ServicesTechnology
BleepingComputerMar 26, 20263m2
ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories
The Hacker News
Critical
Industry News
88/10

ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories

ThreatsDay Bulletin covers stealthy attack trends, evolving phishing tactics, supply chain risks, and how familiar tools are being quietly abused.

Multiple: Sandworm (APT-C-13), APT-Q-27 (GoldenEyeDog), North Korean IT Workers (DPRK), Larva-26002, Tycoon2FA operators, Pakistan-linked ISI-affiliated actorsTechnologyHealthcare
The Hacker NewsMar 26, 202619m1
Smashing Security podcast #460: Never knock on the door of a nuclear submarine base and ask for a selfie
Graham Cluley
High
Industry News
72/10

Smashing Security podcast #460: Never knock on the door of a nuclear submarine base and ask for a selfie

A disgruntled data analyst decides that the best response to losing his contract is to steal the entire company payroll database and demand $2.5…

Unidentified Iranian and Romanian nationals; disgruntled insider (data analyst); China-linked hacker groupFinancial ServicesDefense
Graham CluleyMar 26, 20262m1
[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks
The Hacker News
Info
Industry News
15/10

[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks

Validate your security posture with real attacker behavior using continuous, CTI-driven testing to uncover gaps and prove defenses work.

All SectorsFinancial Services
The Hacker NewsMar 26, 20262m1
Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks
The Hacker News
Critical
Industry News
93/10

Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks

Coruna reuses Triangulation kernel exploits targeting iOS 13–17.2.1 devices, expanding attacks into mass exploitation campaigns.

Russia-aligned nation-state actor (linked to Operation Triangulation developers)GovernmentFinancial Services
The Hacker NewsMar 26, 20264m2