news
Breaking Cyber News From Cyberint
Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.
- All Items
- Asia
- Israel
- Handala
- Data Encrypted For Impact
- Jobinfo
- Business Services
- Middle East
- Shelter Locations In Israel
- Saudi Games
- Retail
- Saudi Arabia
- Cyber Fattah Team
- Ben Horin & Alexandrovitz
- Zachary Levi And Sons - Construction
- Sivim It
- Government
- Kibbutz Almog
- Saban Brands Israel
- Manufacturing
- Digitalghost
- Mprest
- Evil_Byte
- The Knesset
- Gonjeshke Darande
- Nobitex
- Kimia Farma
- exclusive
- Indonesia
- Chemicals And Allied Products
- Sentap
- South-Eastern Asia
- Europe
- Scania
- Transportation
- Hensi
- Northern Europe
- Sweden
- Tbn Israel
- Media
- Weizmann Institute Of Science
- Education
- Resistancetrench
- Israeli Air Force
- Dienet
- Israel Antiquities Authority
- Mirai
- Cve-2025-24016
- North America
- United States
- Wazuh
- CVE-2025-24016
- Technology
- Clayoxtymus1337
- Epsilor Electric Fuel
- India
- Advanced Weapons And Equipment India
- Southern Asia
- More_Eggs
- Fin6
- Alex Lab
- Cryptocurrency
- United Kingdom
- Zoldyck
- Edf Energy
- Critical Infrastructures
- Amos
- Sudo And Sudo Caching
- Telecommunications
- Credentials In Files
- Disable Or Modify Tools
- Match Legitimate Name Or Location
- Unix Shell
- Spearphishing Link
- Spectrum
- Ingress Tool Transfer
- Israel Defense Forces
- Coca-Cola Europacific Partners
- Food And Kindred Products
- Ghna
- Italy
- Locauto
- Automotive
- Southern Europe
- Mercadona
- Whitecoat
- Spain
- Healthcare
- Wow Health Solutions
- Ups
- Rip_Real_World
- Cyprus Airways
- Netsupport Rat
- Tel Aviv University
- Illeak
- Desec0X
- Yashma
- Lucky_Gh0$T
- Unc6032
- Chaos
- Cyberlock
- Numero
- Deloitte
- 303
- Gucci
- Virtualization/Sandbox Evasion
- Obfuscated Files Or Information
- File And Directory Discovery
- Data From Local System
- Credentials From Password Stores
- Exfiltration Over C2 Channel
- Credentials From Web Browsers
- Windows Credential Manager
- Input Capture
- Eddiestealer
- Phishing
- Drive-By Compromise
- Command And Scripting Interpreter
- User Execution
- Password Managers
- System Information Discovery
- Screen Capture
- Australia And New Zealand
- W_Tchdogs
- Superloop
- Australia
- Smb/Windows Admin Shares
- Exploitation For Client Execution
- Change Default File Association
- Web Protocols
- External Remote Services
- Network Service Discovery
- Escape To Host
- Deploy Container
- Resource Hijacking
- Docker
- Lateral Tool Transfer
- Remote System Discovery
- Exploit Public-Facing Application
- Romania
- Bitdefender
- Eastern Europe
- Cameleon
- Venom Rat
- Financial Theft
- Cve-2023-20118
- Macao Special Administrative Region
- Cisco
- CVE-2023-20118
- Vicioustrap
- Eastern Asia
- Cve-2025-0944
- Tetraloader
- Uat-6382
- Trimble
- CVE-2025-0944
- Scheduled Task
- Obfuscated Files Or Information: Encrypted Or Encoded Data
- Dynamic-Link Library Injection
- Rundll32
- China
- Reflective Code Loading
- Regsvr32
- Valleyrat
- File Deletion
- Process Discovery
- Masquerade Task Or Service
- Powershell
- Malicious File
- Silver Fox
- Qakbot
- Danabot
- Warmcookie
- Bumblebee
- Trickbot
- Cetus
- Purehvnc
- Bytebreaker
- Mexico
- Viralgod
- Latin America And The Caribbean
- Telcel
- Peter Green Chilled
- Cellcom
-
Jun 05, 2025
Coca-Cola Europacific Partners - Breach - 2025-05-22
On May 22, 2025, the threat actor Gehenna claimed responsibility for breaching Coca-Cola Europacific Partners’ Salesforce infrastructure, exfiltrating a substantial volume of business data. The breach reportedly includes over 75 million records spanning accounts, contacts, products, and customer service cases from 2016 to 2025, totaling more than 63 GB of sensitive CRM data. Gehenna, linked to previous incidents involving Samsung Germany and Royal Mail, is offering this data for sale, emphasizing the scale and commercial relevance of the compromised information.