news
Breaking Cyber News From Cyberint
Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.
- All Items
- Jobinfo
- Israel
- Handala
- Business Services
- Data Encrypted For Impact
- Middle East
- Asia
- Shelter Locations In Israel
- Retail
- Saudi Arabia
- Saudi Games
- Cyber Fattah Team
- Ben Horin & Alexandrovitz
- Zachary Levi And Sons - Construction
- Sivim It
- Kibbutz Almog
- Government
- Manufacturing
- Saban Brands Israel
- Digitalghost
- Mprest
- The Knesset
- Evil_Byte
- Gonjeshke Darande
- Nobitex
- Chemicals And Allied Products
- Kimia Farma
- exclusive
- South-Eastern Asia
- Indonesia
- Sentap
- Transportation
- Northern Europe
- Scania
- Europe
- Hensi
- Sweden
- Tbn Israel
- Media
- Weizmann Institute Of Science
- Education
- Resistancetrench
- Israeli Air Force
- Dienet
- Israel Antiquities Authority
- United States
- Mirai
- CVE-2025-24016
- North America
- Wazuh
- Cve-2025-24016
- Epsilor Electric Fuel
- Clayoxtymus1337
- Technology
- Southern Asia
- Advanced Weapons And Equipment India
- India
- More_Eggs
- Fin6
- Cryptocurrency
- Alex Lab
- Edf Energy
- United Kingdom
- Zoldyck
- Critical Infrastructures
- Sudo And Sudo Caching
- Telecommunications
- Credentials In Files
- Spearphishing Link
- Disable Or Modify Tools
- Match Legitimate Name Or Location
- Spectrum
- Unix Shell
- Ingress Tool Transfer
- Amos
- Israel Defense Forces
- Food And Kindred Products
- Coca-Cola Europacific Partners
- Ghna
- Italy
- Automotive
- Southern Europe
- Locauto
- Whitecoat
- Spain
- Mercadona
- Ups
- Wow Health Solutions
- Healthcare
- Cyprus Airways
- Rip_Real_World
- Netsupport Rat
- Tel Aviv University
- Illeak
- Desec0X
- Unc6032
- Numero
- Chaos
- Lucky_Gh0$T
- Yashma
- Cyberlock
- 303
- Deloitte
- Gucci
- Credentials From Web Browsers
- Password Managers
- Input Capture
- User Execution
- Credentials From Password Stores
- Obfuscated Files Or Information
- Phishing
- System Information Discovery
- Command And Scripting Interpreter
- Exfiltration Over C2 Channel
- Virtualization/Sandbox Evasion
- Screen Capture
- Windows Credential Manager
- Eddiestealer
- Drive-By Compromise
- File And Directory Discovery
- Data From Local System
- Australia And New Zealand
- Australia
- W_Tchdogs
- Superloop
- Resource Hijacking
- Network Service Discovery
- Exploitation For Client Execution
- Escape To Host
- Docker
- External Remote Services
- Smb/Windows Admin Shares
- Remote System Discovery
- Lateral Tool Transfer
- Deploy Container
- Web Protocols
- Change Default File Association
- Exploit Public-Facing Application
- Romania
- Venom Rat
- Bitdefender
- Financial Theft
- Eastern Europe
- Cameleon
- Cve-2023-20118
- Vicioustrap
- Cisco
- Macao Special Administrative Region
- CVE-2023-20118
- Eastern Asia
- Cve-2025-0944
- CVE-2025-0944
- Tetraloader
- Uat-6382
- Trimble
- Dynamic-Link Library Injection
- Silver Fox
- Regsvr32
- Reflective Code Loading
- Valleyrat
- Process Discovery
- Scheduled Task
- File Deletion
- Powershell
- Obfuscated Files Or Information: Encrypted Or Encoded Data
- China
- Malicious File
- Masquerade Task Or Service
- Rundll32
- Qakbot
- Trickbot
- Bumblebee
- Danabot
- Warmcookie
- Cetus
- Purehvnc
- Bytebreaker
- Viralgod
- Telcel
- Latin America And The Caribbean
- Mexico
- Peter Green Chilled
- Cellcom
-
Jun 22, 2025
Surveillance Firm Saban Systems Alleged Breached by Handala
On June 19, 2025, the pro-Palestinian hacktivist group Handala claimed responsibility for a breach targeting Israeli surveillance technology provider Saban Systems. The group alleges to have exfiltrated 254GB of confidential data and has released over 50,000 internal documents as proof of compromise.
-
Jun 16, 2025
Data Breach Exposes Over 1 Million Records from Indonesian Pharmacy Giant Kimia Farma
A threat actor named "sentap" is offering a 40GB dataset stolen from "Kimia Farma," Indonesia’s leading state-owned pharmacy network, on the dark forum "darkforumes.me." The leak includes over 1 million records containing detailed pharmaceutical inventory, sales transactions, discount schemes, and high-risk stock information collected between March and July 2024. Validated against Kimia Farma’s ERP system, the data reveals sensitive national-level supply chain and market insights valuable for market analysis, cyber intelligence, and social engineering. The dataset is sold for $10,000 USD in Bitcoin or Monero, with an escrow service ensuring transaction security.
-
Jun 11, 2025
Fin6 Leverages Fake Resumes for Malware Delivery
The financially motivated threat actor Fin6 has been observed using fake resumes hosted on Amazon Web Services (AWS) to deliver the malware family known as More_Eggs. By posing as job seekers on platforms like LinkedIn and Indeed, Fin6 builds rapport with recruiters and sends phishing messages that lead to malware downloads. More_Eggs, developed by another cybercrime group called Golden Chickens, is a JavaScript-based backdoor capable of credential theft and system access. Fin6 has a history of targeting e-commerce sites to steal payment card data and has been operational since 2012.
-
May 22, 2025
Malware Campaign Exploiting Kling AI to Target Users
A new malware campaign has been identified that uses counterfeit Facebook pages and sponsored ads to lure users to fake websites impersonating Kling AI, an AI-powered platform. The campaign, first detected in early 2025, tricks victims into downloading a malicious file that installs a remote access trojan (RAT) on their systems, allowing attackers to steal sensitive data. The operation is linked to Vietnamese threat actors, who have been increasingly using social engineering tactics to exploit the popularity of generative AI tools. The campaign highlights the growing trend of sophisticated social media-based attacks targeting unsuspecting users.
-
May 21, 2025
Threat Actor Claims to Have Scraped Hundreds of Millions of Facebook Records
In May 2025, a threat actor named ByteBreaker claimed to have scraped accounts from Facebook. According to the threat actor, hundreds of millions of records belonging to Facebook's users were taken, including various types of data scraped by abusing one of their APIs.