news
Breaking Cyber News From Cyberint
Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.
- All Items
- Middle East
- Handala
- Business Services
- Data Encrypted For Impact
- Israel
- Jobinfo
- Asia
- Shelter Locations In Israel
- Retail
- Saudi Games
- Saudi Arabia
- Cyber Fattah Team
- Ben Horin & Alexandrovitz
- Zachary Levi And Sons - Construction
- Sivim It
- Government
- Kibbutz Almog
- Manufacturing
- Saban Brands Israel
- Mprest
- Digitalghost
- Evil_Byte
- The Knesset
- Gonjeshke Darande
- Nobitex
- Chemicals And Allied Products
- South-Eastern Asia
- Kimia Farma
- Indonesia
- Sentap
- exclusive
- Northern Europe
- Europe
- Sweden
- Transportation
- Scania
- Hensi
- Tbn Israel
- Media
- Weizmann Institute Of Science
- Education
- Israeli Air Force
- Resistancetrench
- Israel Antiquities Authority
- Dienet
- Wazuh
- Cve-2025-24016
- CVE-2025-24016
- United States
- Mirai
- North America
- Epsilor Electric Fuel
- Clayoxtymus1337
- Technology
- Advanced Weapons And Equipment India
- India
- Southern Asia
- Fin6
- More_Eggs
- Alex Lab
- Cryptocurrency
- Zoldyck
- Edf Energy
- Critical Infrastructures
- United Kingdom
- Ingress Tool Transfer
- Spectrum
- Unix Shell
- Amos
- Sudo And Sudo Caching
- Credentials In Files
- Disable Or Modify Tools
- Telecommunications
- Match Legitimate Name Or Location
- Spearphishing Link
- Israel Defense Forces
- Coca-Cola Europacific Partners
- Ghna
- Food And Kindred Products
- Automotive
- Locauto
- Southern Europe
- Italy
- Spain
- Whitecoat
- Mercadona
- Healthcare
- Ups
- Wow Health Solutions
- Cyprus Airways
- Rip_Real_World
- Netsupport Rat
- Tel Aviv University
- Illeak
- Desec0X
- Lucky_Gh0$T
- Yashma
- Numero
- Cyberlock
- Chaos
- Unc6032
- Deloitte
- 303
- Gucci
- Screen Capture
- Credentials From Password Stores
- Password Managers
- System Information Discovery
- Phishing
- Exfiltration Over C2 Channel
- Credentials From Web Browsers
- Data From Local System
- Windows Credential Manager
- Input Capture
- File And Directory Discovery
- Drive-By Compromise
- Virtualization/Sandbox Evasion
- Command And Scripting Interpreter
- Obfuscated Files Or Information
- User Execution
- Eddiestealer
- Australia
- Superloop
- Australia And New Zealand
- W_Tchdogs
- Lateral Tool Transfer
- Escape To Host
- Exploitation For Client Execution
- Resource Hijacking
- Smb/Windows Admin Shares
- External Remote Services
- Network Service Discovery
- Exploit Public-Facing Application
- Deploy Container
- Remote System Discovery
- Web Protocols
- Change Default File Association
- Docker
- Cameleon
- Romania
- Eastern Europe
- Venom Rat
- Financial Theft
- Bitdefender
- CVE-2023-20118
- Vicioustrap
- Eastern Asia
- Cve-2023-20118
- Macao Special Administrative Region
- Cisco
- Tetraloader
- CVE-2025-0944
- Trimble
- Cve-2025-0944
- Uat-6382
- Powershell
- Silver Fox
- Rundll32
- Masquerade Task Or Service
- Scheduled Task
- Dynamic-Link Library Injection
- Obfuscated Files Or Information: Encrypted Or Encoded Data
- Regsvr32
- Process Discovery
- File Deletion
- China
- Valleyrat
- Malicious File
- Reflective Code Loading
- Warmcookie
- Qakbot
- Danabot
- Bumblebee
- Trickbot
- Cetus
- Purehvnc
- Bytebreaker
- Telcel
- Latin America And The Caribbean
- Mexico
- Viralgod
- Peter Green Chilled
- Cellcom
-
Jun 19, 2025
DigitalGhost Claims Breach of Israeli Iron Dome Contractor
A threat actor operating under the alias "DigitalGhost" has claimed responsibility for allegedly breaching mPrest, an Israeli technology contractor allegedly involved in developing software for the Iron Dome missile defense system. According to the attacker, they managed to access a database containing personal information of individuals connected to the company. No official confirmation has been provided regarding the authenticity or scope of the breach.