news
Breaking Cyber News From Cyberint
Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.
- All Items
- Business Services
- Asia
- Data Encrypted For Impact
- Handala
- Middle East
- Jobinfo
- Israel
- Shelter Locations In Israel
- Cyber Fattah Team
- Retail
- Saudi Arabia
- Saudi Games
- Ben Horin & Alexandrovitz
- Zachary Levi And Sons - Construction
- Sivim It
- Kibbutz Almog
- Government
- Manufacturing
- Saban Brands Israel
- Digitalghost
- Mprest
- Evil_Byte
- The Knesset
- Nobitex
- Gonjeshke Darande
- Kimia Farma
- Sentap
- South-Eastern Asia
- Chemicals And Allied Products
- Indonesia
- exclusive
- Scania
- Northern Europe
- Transportation
- Sweden
- Hensi
- Europe
- Tbn Israel
- Media
- Education
- Weizmann Institute Of Science
- Israeli Air Force
- Resistancetrench
- Israel Antiquities Authority
- Dienet
- North America
- CVE-2025-24016
- Wazuh
- Cve-2025-24016
- United States
- Mirai
- Epsilor Electric Fuel
- Clayoxtymus1337
- Technology
- Advanced Weapons And Equipment India
- Southern Asia
- India
- More_Eggs
- Fin6
- Cryptocurrency
- Alex Lab
- Critical Infrastructures
- United Kingdom
- Zoldyck
- Edf Energy
- Disable Or Modify Tools
- Spectrum
- Credentials In Files
- Amos
- Telecommunications
- Match Legitimate Name Or Location
- Ingress Tool Transfer
- Sudo And Sudo Caching
- Unix Shell
- Spearphishing Link
- Israel Defense Forces
- Ghna
- Food And Kindred Products
- Coca-Cola Europacific Partners
- Italy
- Locauto
- Southern Europe
- Automotive
- Whitecoat
- Spain
- Mercadona
- Wow Health Solutions
- Healthcare
- Ups
- Rip_Real_World
- Cyprus Airways
- Netsupport Rat
- Illeak
- Tel Aviv University
- Desec0X
- Chaos
- Cyberlock
- Lucky_Gh0$T
- Yashma
- Numero
- Unc6032
- 303
- Deloitte
- Gucci
- Drive-By Compromise
- Command And Scripting Interpreter
- Windows Credential Manager
- Password Managers
- User Execution
- File And Directory Discovery
- Data From Local System
- System Information Discovery
- Eddiestealer
- Obfuscated Files Or Information
- Credentials From Password Stores
- Phishing
- Exfiltration Over C2 Channel
- Screen Capture
- Input Capture
- Virtualization/Sandbox Evasion
- Credentials From Web Browsers
- Superloop
- W_Tchdogs
- Australia And New Zealand
- Australia
- Smb/Windows Admin Shares
- Exploitation For Client Execution
- Resource Hijacking
- Change Default File Association
- Remote System Discovery
- Deploy Container
- Exploit Public-Facing Application
- External Remote Services
- Escape To Host
- Network Service Discovery
- Lateral Tool Transfer
- Docker
- Web Protocols
- Romania
- Bitdefender
- Financial Theft
- Eastern Europe
- Cameleon
- Venom Rat
- Cisco
- Eastern Asia
- CVE-2023-20118
- Cve-2023-20118
- Macao Special Administrative Region
- Vicioustrap
- Uat-6382
- Trimble
- CVE-2025-0944
- Tetraloader
- Cve-2025-0944
- Rundll32
- Powershell
- Process Discovery
- Regsvr32
- Silver Fox
- Malicious File
- Dynamic-Link Library Injection
- Scheduled Task
- China
- Valleyrat
- Obfuscated Files Or Information: Encrypted Or Encoded Data
- Masquerade Task Or Service
- Reflective Code Loading
- File Deletion
- Warmcookie
- Bumblebee
- Danabot
- Trickbot
- Qakbot
- Cetus
- Purehvnc
- Bytebreaker
- Viralgod
- Mexico
- Latin America And The Caribbean
- Telcel
- Peter Green Chilled
- Cellcom
-
Jun 12, 2025
Alleged Data Breach of Israeli Antiquities Authority
On June 11, 2025, a threat actor claimed a data breach targeting the Israeli Antiquities Authority, potentially exposing sensitive archaeological or administrative data. This information is recycled and irrelevant, as the claim lacks credible evidence, appears to be outdated, and has no official confirmation from the authority or cybersecurity agencies.