Fixed Intel

Knowledge Hub

Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.

Industry News

World Leaks data extortion: What you need to know

Graham Cluley
High
Industry News
75/10

World Leaks data extortion: What you need to know

World Leaks is a cyber extortion operation that steals sensitive data from organizations and threatens to leak it via the dark web if a ransom is not paid. Read more in my article on the Fortra blog.

World LeaksAll SectorsFinance
Graham CluleyMar 26, 20261m1
Alleged RedLine Malware Administrator Extradited to US
SecurityWeek
High
Industry News
75/10

Alleged RedLine Malware Administrator Extradited to US

Hambardzum Minasyan of Armenia has been accused of being involved in the development and administration of the infostealer malware.

RedLine MaaS Group (Hambardzum Minasyan, Maxim Alexandrovich Rudometov)Financial ServicesTechnology
SecurityWeekMar 26, 20262m1
Dell and HP Roll Out Quantum-Resistant Device Security and AI-Era Cyber Resilience
SecurityWeek
High
Industry News
72/10

Dell and HP Roll Out Quantum-Resistant Device Security and AI-Era Cyber Resilience

The computer giants have announced new security capabilities for PCs and printers.

TechnologyManufacturing
SecurityWeekMar 26, 20263m1
WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites
The Hacker News
Critical
Industry News
91/10

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

WebRTC skimmer exploits PolyShell flaw since March 19, hitting 56.7% stores, enabling stealth data theft bypassing CSP.

E-CommerceRetail
The Hacker NewsMar 26, 20262m1
Vulnerabilities

ISC Stormcast For Thursday, March 26th, 2026 https://isc.sans.edu/podcastdetail/9866, (Thu, Mar 26th)

SANS ISC
Info
Vulnerabilities
10/10

ISC Stormcast For Thursday, March 26th, 2026 https://isc.sans.edu/podcastdetail/9866, (Thu, Mar 26th)

No description available.

All SectorsInformation Technology
SANS ISCMar 26, 20261m2
GitHub adds AI-powered bug detection to expand security coverage
BleepingComputer
Info
Malware & Threats
45/10

GitHub adds AI-powered bug detection to expand security coverage

GitHub is adopting AI-based scanning for its Code Security tool to expand vulnerability detections beyond the CodeQL static analysis and cover more languages and frameworks.

TechnologySoftware Development
BleepingComputerMar 25, 20263m2
Industry News

At RSAC, the EU Leads While US Officials Are Sidelined

Dark Reading
Medium
Industry News
45/10

At RSAC, the EU Leads While US Officials Are Sidelined

While US government sits out this year, EU officials are on the ground in San Francisco leading the conversations on today's top cybersecurity challenges.

GovernmentTechnology
Dark ReadingMar 25, 20261m1
PolyShell attacks target 56% of all vulnerable Magento stores
BleepingComputer
Critical
Malware & Threats
92/10

PolyShell attacks target 56% of all vulnerable Magento stores

Attacks leveraging the 'PolyShell' vulnerability in version 2 of Magento Open Source and Adobe Commerce installations are underway, targeting more than half of all vulnerable stores.

E-CommerceRetail
BleepingComputerMar 25, 20263m2
Vulnerabilities

Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th)

SANS ISC
High
Vulnerabilities
72/10

Apple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th)

Apple released the next version of its operating system, patching 85 different vulnerabilities across all of them. None of the vulnerabilities are currently being exploited. The last three macOS "generations" are covered, as are the last two versions of iOS/iPadOS. For tvOS, watchOS, and visionOS...

TechnologyConsumer Electronics
SANS ISCMar 25, 20261m2
Bubble AI app builder abused to steal Microsoft account credentials
BleepingComputer
High
Malware & Threats
78/10

Bubble AI app builder abused to steal Microsoft account credentials

Threat actors are evading phishing detection in campaigns targeting Microsoft accounts by abusing the no-code app-building platform Bubble to generate and host malicious web apps.

TechnologyFinance
BleepingComputerMar 25, 20263m2
New Torg Grabber infostealer malware targets 728 crypto wallets
BleepingComputer
Critical
Malware & Threats
88/10

New Torg Grabber infostealer malware targets 728 crypto wallets

A new info-stealing malware called Torg Grabber is stealing sensitive data from 850 browser extensions, more than 700 of them for cryptocurrency wallets.

Financial ServicesCryptocurrency
BleepingComputerMar 25, 20263m2
Industry News

LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

The Hacker News
High
Industry News
72/10

LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

The alleged administrator of the LeakBase cybercrime forum has been arrested by Russian law enforcement authorities, state media reported Thursday. According to TASS and MVD Media, a news website linked to the Russian Interior Ministry, the suspect is a resident of the city of Taganrog. The suspe...

LeakBase Administrator (unnamed)FinanceTechnology
The Hacker NewsMar 25, 20261m1