news
Breaking Cyber News From Cyberint
Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.
- All Items
- Handala
- Israel
- Jobinfo
- Middle East
- Asia
- Business Services
- Data Encrypted For Impact
- Shelter Locations In Israel
- Cyber Fattah Team
- Saudi Games
- Retail
- Saudi Arabia
- Ben Horin & Alexandrovitz
- Zachary Levi And Sons - Construction
- Sivim It
- Kibbutz Almog
- Government
- Saban Brands Israel
- Manufacturing
- Digitalghost
- Mprest
- The Knesset
- Evil_Byte
- Nobitex
- Gonjeshke Darande
- Chemicals And Allied Products
- South-Eastern Asia
- Sentap
- Kimia Farma
- exclusive
- Indonesia
- Europe
- Scania
- Northern Europe
- Hensi
- Transportation
- Sweden
- Tbn Israel
- Media
- Education
- Weizmann Institute Of Science
- Resistancetrench
- Israeli Air Force
- Israel Antiquities Authority
- Dienet
- Wazuh
- Cve-2025-24016
- Mirai
- CVE-2025-24016
- United States
- North America
- Clayoxtymus1337
- Technology
- Epsilor Electric Fuel
- Advanced Weapons And Equipment India
- Southern Asia
- India
- More_Eggs
- Fin6
- Alex Lab
- Cryptocurrency
- Edf Energy
- Critical Infrastructures
- United Kingdom
- Zoldyck
- Telecommunications
- Credentials In Files
- Match Legitimate Name Or Location
- Spearphishing Link
- Amos
- Spectrum
- Sudo And Sudo Caching
- Unix Shell
- Ingress Tool Transfer
- Disable Or Modify Tools
- Israel Defense Forces
- Coca-Cola Europacific Partners
- Ghna
- Food And Kindred Products
- Automotive
- Italy
- Southern Europe
- Locauto
- Whitecoat
- Spain
- Mercadona
- Healthcare
- Wow Health Solutions
- Ups
- Rip_Real_World
- Cyprus Airways
- Netsupport Rat
- Illeak
- Tel Aviv University
- Desec0X
- Yashma
- Chaos
- Lucky_Gh0$T
- Unc6032
- Cyberlock
- Numero
- Deloitte
- 303
- Gucci
- Phishing
- Credentials From Web Browsers
- File And Directory Discovery
- Screen Capture
- Obfuscated Files Or Information
- Data From Local System
- Windows Credential Manager
- System Information Discovery
- Eddiestealer
- Input Capture
- Credentials From Password Stores
- Virtualization/Sandbox Evasion
- Drive-By Compromise
- Password Managers
- Exfiltration Over C2 Channel
- Command And Scripting Interpreter
- User Execution
- Australia And New Zealand
- W_Tchdogs
- Australia
- Superloop
- Remote System Discovery
- Smb/Windows Admin Shares
- Escape To Host
- Lateral Tool Transfer
- Web Protocols
- Exploitation For Client Execution
- External Remote Services
- Docker
- Network Service Discovery
- Exploit Public-Facing Application
- Change Default File Association
- Deploy Container
- Resource Hijacking
- Venom Rat
- Bitdefender
- Eastern Europe
- Romania
- Financial Theft
- Cameleon
- CVE-2023-20118
- Eastern Asia
- Vicioustrap
- Cve-2023-20118
- Cisco
- Macao Special Administrative Region
- Uat-6382
- Tetraloader
- Trimble
- Cve-2025-0944
- CVE-2025-0944
- Process Discovery
- Malicious File
- Obfuscated Files Or Information: Encrypted Or Encoded Data
- Silver Fox
- China
- Dynamic-Link Library Injection
- Regsvr32
- File Deletion
- Rundll32
- Scheduled Task
- Masquerade Task Or Service
- Valleyrat
- Reflective Code Loading
- Powershell
- Danabot
- Trickbot
- Qakbot
- Warmcookie
- Bumblebee
- Cetus
- Purehvnc
- Bytebreaker
- Telcel
- Latin America And The Caribbean
- Mexico
- Viralgod
- Peter Green Chilled
- Cellcom
-
Jun 22, 2025
Kibbutz Almog Allegedly Breached by Handala
On June 20, 2025, the pro-Palestinian hacktivist group Handala claimed responsibility for an alleged breach targeting Kibbutz Almog, an Israeli communal settlement. The group alleges to have exfiltrated extensive internal materials, including email communications, financial and personnel records, surveillance footage, and backup archives. As proof of compromise, Handala shared over 60,000 documents proof of compromise and threatened further data exposure.
-
Jun 19, 2025
Evil_Byte Claims Breach of Israeli Government Body System June
On June 17, 2025, hacktivist group Evil_Byte claimed responsibility for a cyberattack allegedly targeting Israeli government infrastructure. The group asserted that they had gained root-level access and exfiltrated sensitive data, including authentication credentials and phone numbers linked to Mossad and police personnel. No independent verification of unauthorized access or data theft has been confirmed.
-
Jun 15, 2025
Israeli Air Force Pilot Data Allegedly Leaked by Pro-Iranian Actor
On June 15, 2025, Sensitive data belonging to 40 Israeli Air Force pilots was allegedly leaked by a pro-Iranian source amid the ongoing Israel-Iran conflict. The breach reportedly targeted classified military data within the Israeli Ministry of Defense, exposing highly confidential details such as pilots' full names, ages, combat units, air bases, and field roles. According to the attackers, the pilots operated aircraft including the F-15I Ra’am, F-16I Sufa, and F-35I Adir. The credibility of the leak is challenged by the fact that the identity of the threat actor behind the disclosure was not revealed, and the unknown source of the data further raises questions about its authenticity.
-
Jun 09, 2025
Wave of Recycled Data Leaks Targets Israeli Institutions to Simulate Active Breach Campaigns
A possibly coordinated wave of threat activity observed in early June 2025 involves the resurfacing of recycled or publicly available data falsely presented as new breaches targeting Israeli institutions, including the Israel Police, Ministry of Housing, IDF, and National Insurance Institute. Threat actors shared large archives and high-profile claims—such as a 16.9 GB police data leak and an alleged Android zero-day used against IDF personnel—to simulate active cyberattacks, despite forensic analysis confirming that most materials are outdated or previously exposed.
-
May 26, 2025
Chinese Threat Actor UAT-6382 Exploits Vulnerability in Trimble Cityworks
A Chinese-speaking threat actor known as UAT-6382 has been linked to the exploitation of a recently patched remote-code-execution vulnerability (CVE-2025-0944) in Trimble Cityworks. This group successfully targeted enterprise networks of local governing bodies in the United States, deploying various web shells and custom malware, including Cobalt Strike and a Rust-based loader called Tetraloader, to maintain long-term access to compromised systems. The attacks began in January 2025, and the vulnerability was added to the U.S. Cybersecurity and Infrastructure Security Agency's known exploited vulnerabilities catalog in February 2025.