news
Breaking Cyber News From Cyberint
Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.
- All Items
- Middle East
- Handala
- Business Services
- Data Encrypted For Impact
- Israel
- Jobinfo
- Asia
- Shelter Locations In Israel
- Retail
- Saudi Games
- Saudi Arabia
- Cyber Fattah Team
- Ben Horin & Alexandrovitz
- Zachary Levi And Sons - Construction
- Sivim It
- Government
- Kibbutz Almog
- Manufacturing
- Saban Brands Israel
- Mprest
- Digitalghost
- Evil_Byte
- The Knesset
- Gonjeshke Darande
- Nobitex
- Chemicals And Allied Products
- South-Eastern Asia
- Kimia Farma
- Indonesia
- Sentap
- exclusive
- Northern Europe
- Europe
- Sweden
- Transportation
- Scania
- Hensi
- Tbn Israel
- Media
- Weizmann Institute Of Science
- Education
- Israeli Air Force
- Resistancetrench
- Israel Antiquities Authority
- Dienet
- Wazuh
- Cve-2025-24016
- CVE-2025-24016
- United States
- Mirai
- North America
- Epsilor Electric Fuel
- Clayoxtymus1337
- Technology
- Advanced Weapons And Equipment India
- India
- Southern Asia
- Fin6
- More_Eggs
- Alex Lab
- Cryptocurrency
- Zoldyck
- Edf Energy
- Critical Infrastructures
- United Kingdom
- Ingress Tool Transfer
- Spectrum
- Unix Shell
- Amos
- Sudo And Sudo Caching
- Credentials In Files
- Disable Or Modify Tools
- Telecommunications
- Match Legitimate Name Or Location
- Spearphishing Link
- Israel Defense Forces
- Coca-Cola Europacific Partners
- Ghna
- Food And Kindred Products
- Automotive
- Locauto
- Southern Europe
- Italy
- Spain
- Whitecoat
- Mercadona
- Healthcare
- Ups
- Wow Health Solutions
- Cyprus Airways
- Rip_Real_World
- Netsupport Rat
- Tel Aviv University
- Illeak
- Desec0X
- Lucky_Gh0$T
- Yashma
- Numero
- Cyberlock
- Chaos
- Unc6032
- Deloitte
- 303
- Gucci
- Screen Capture
- Credentials From Password Stores
- Password Managers
- System Information Discovery
- Phishing
- Exfiltration Over C2 Channel
- Credentials From Web Browsers
- Data From Local System
- Windows Credential Manager
- Input Capture
- File And Directory Discovery
- Drive-By Compromise
- Virtualization/Sandbox Evasion
- Command And Scripting Interpreter
- Obfuscated Files Or Information
- User Execution
- Eddiestealer
- Australia
- Superloop
- Australia And New Zealand
- W_Tchdogs
- Lateral Tool Transfer
- Escape To Host
- Exploitation For Client Execution
- Resource Hijacking
- Smb/Windows Admin Shares
- External Remote Services
- Network Service Discovery
- Exploit Public-Facing Application
- Deploy Container
- Remote System Discovery
- Web Protocols
- Change Default File Association
- Docker
- Cameleon
- Romania
- Eastern Europe
- Venom Rat
- Financial Theft
- Bitdefender
- CVE-2023-20118
- Vicioustrap
- Eastern Asia
- Cve-2023-20118
- Macao Special Administrative Region
- Cisco
- Tetraloader
- CVE-2025-0944
- Trimble
- Cve-2025-0944
- Uat-6382
- Powershell
- Silver Fox
- Rundll32
- Masquerade Task Or Service
- Scheduled Task
- Dynamic-Link Library Injection
- Obfuscated Files Or Information: Encrypted Or Encoded Data
- Regsvr32
- Process Discovery
- File Deletion
- China
- Valleyrat
- Malicious File
- Reflective Code Loading
- Warmcookie
- Qakbot
- Danabot
- Bumblebee
- Trickbot
- Cetus
- Purehvnc
- Bytebreaker
- Telcel
- Latin America And The Caribbean
- Mexico
- Viralgod
- Peter Green Chilled
- Cellcom
-
May 21, 2025
Cellcom Reports Data Breach Following Outages
In May 2025, mobile carrier Cellcom became the victim of a cyberattack that caused widespread service outages and disruptions across Wisconsin and Upper Michigan. According to Cellcom, while the incident affected voice and SMS services, there is no evidence that personal information, such as names, addresses, or financial data, was compromised during the attack.