news
Breaking Cyber News From Cyberint
Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.
- All Items
- Middle East
- Handala
- Business Services
- Data Encrypted For Impact
- Israel
- Jobinfo
- Asia
- Shelter Locations In Israel
- Retail
- Saudi Games
- Saudi Arabia
- Cyber Fattah Team
- Ben Horin & Alexandrovitz
- Zachary Levi And Sons - Construction
- Sivim It
- Government
- Kibbutz Almog
- Manufacturing
- Saban Brands Israel
- Mprest
- Digitalghost
- Evil_Byte
- The Knesset
- Gonjeshke Darande
- Nobitex
- Chemicals And Allied Products
- South-Eastern Asia
- Kimia Farma
- Indonesia
- Sentap
- exclusive
- Northern Europe
- Europe
- Sweden
- Transportation
- Scania
- Hensi
- Tbn Israel
- Media
- Weizmann Institute Of Science
- Education
- Israeli Air Force
- Resistancetrench
- Israel Antiquities Authority
- Dienet
- Wazuh
- Cve-2025-24016
- CVE-2025-24016
- United States
- Mirai
- North America
- Epsilor Electric Fuel
- Clayoxtymus1337
- Technology
- Advanced Weapons And Equipment India
- India
- Southern Asia
- Fin6
- More_Eggs
- Alex Lab
- Cryptocurrency
- Zoldyck
- Edf Energy
- Critical Infrastructures
- United Kingdom
- Ingress Tool Transfer
- Spectrum
- Unix Shell
- Amos
- Sudo And Sudo Caching
- Credentials In Files
- Disable Or Modify Tools
- Telecommunications
- Match Legitimate Name Or Location
- Spearphishing Link
- Israel Defense Forces
- Coca-Cola Europacific Partners
- Ghna
- Food And Kindred Products
- Automotive
- Locauto
- Southern Europe
- Italy
- Spain
- Whitecoat
- Mercadona
- Healthcare
- Ups
- Wow Health Solutions
- Cyprus Airways
- Rip_Real_World
- Netsupport Rat
- Tel Aviv University
- Illeak
- Desec0X
- Lucky_Gh0$T
- Yashma
- Numero
- Cyberlock
- Chaos
- Unc6032
- Deloitte
- 303
- Gucci
- Screen Capture
- Credentials From Password Stores
- Password Managers
- System Information Discovery
- Phishing
- Exfiltration Over C2 Channel
- Credentials From Web Browsers
- Data From Local System
- Windows Credential Manager
- Input Capture
- File And Directory Discovery
- Drive-By Compromise
- Virtualization/Sandbox Evasion
- Command And Scripting Interpreter
- Obfuscated Files Or Information
- User Execution
- Eddiestealer
- Australia
- Superloop
- Australia And New Zealand
- W_Tchdogs
- Lateral Tool Transfer
- Escape To Host
- Exploitation For Client Execution
- Resource Hijacking
- Smb/Windows Admin Shares
- External Remote Services
- Network Service Discovery
- Exploit Public-Facing Application
- Deploy Container
- Remote System Discovery
- Web Protocols
- Change Default File Association
- Docker
- Cameleon
- Romania
- Eastern Europe
- Venom Rat
- Financial Theft
- Bitdefender
- CVE-2023-20118
- Vicioustrap
- Eastern Asia
- Cve-2023-20118
- Macao Special Administrative Region
- Cisco
- Tetraloader
- CVE-2025-0944
- Trimble
- Cve-2025-0944
- Uat-6382
- Powershell
- Silver Fox
- Rundll32
- Masquerade Task Or Service
- Scheduled Task
- Dynamic-Link Library Injection
- Obfuscated Files Or Information: Encrypted Or Encoded Data
- Regsvr32
- Process Discovery
- File Deletion
- China
- Valleyrat
- Malicious File
- Reflective Code Loading
- Warmcookie
- Qakbot
- Danabot
- Bumblebee
- Trickbot
- Cetus
- Purehvnc
- Bytebreaker
- Telcel
- Latin America And The Caribbean
- Mexico
- Viralgod
- Peter Green Chilled
- Cellcom
-
Jun 16, 2025
Threat Actor Claims Breach of Scania’s Insurance Arm, 34,000 Files Allegedly Stolen
A threat actor using the alias "hensi" claims to have breached insurance.scania[.]com, a subdomain of Scania Financial Services, allegedly stealing 34,000 previously unpublished files. The breach, which reportedly targeted the Swedish manufacturer’s corporate insurance division, was announced on a forum on the dark web. Scania’s insurance services cover commercial vehicles—suggesting the stolen data may include sensitive customer and vehicle information, such as VINs. The targeted site is currently offline, citing maintenance, and Scania has yet to comment on the incident.