news
Breaking Cyber News From Cyberint
Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.
- All Items
- Israel
- Asia
- Business Services
- Handala
- Middle East
- Jobinfo
- Data Encrypted For Impact
- Shelter Locations In Israel
- Retail
- Saudi Games
- Saudi Arabia
- Cyber Fattah Team
- Ben Horin & Alexandrovitz
- Zachary Levi And Sons - Construction
- Sivim It
- Government
- Kibbutz Almog
- Manufacturing
- Saban Brands Israel
- Digitalghost
- Mprest
- Evil_Byte
- The Knesset
- Gonjeshke Darande
- Nobitex
- Sentap
- Kimia Farma
- Chemicals And Allied Products
- exclusive
- South-Eastern Asia
- Indonesia
- Transportation
- Hensi
- Scania
- Europe
- Northern Europe
- Sweden
- Tbn Israel
- Media
- Weizmann Institute Of Science
- Education
- Resistancetrench
- Israeli Air Force
- Israel Antiquities Authority
- Dienet
- Mirai
- Cve-2025-24016
- CVE-2025-24016
- United States
- Wazuh
- North America
- Clayoxtymus1337
- Technology
- Epsilor Electric Fuel
- Advanced Weapons And Equipment India
- Southern Asia
- India
- More_Eggs
- Fin6
- Cryptocurrency
- Alex Lab
- United Kingdom
- Zoldyck
- Edf Energy
- Critical Infrastructures
- Spearphishing Link
- Unix Shell
- Match Legitimate Name Or Location
- Credentials In Files
- Spectrum
- Ingress Tool Transfer
- Amos
- Disable Or Modify Tools
- Telecommunications
- Sudo And Sudo Caching
- Israel Defense Forces
- Food And Kindred Products
- Ghna
- Coca-Cola Europacific Partners
- Southern Europe
- Locauto
- Italy
- Automotive
- Mercadona
- Whitecoat
- Spain
- Ups
- Wow Health Solutions
- Healthcare
- Cyprus Airways
- Rip_Real_World
- Netsupport Rat
- Tel Aviv University
- Illeak
- Desec0X
- Numero
- Chaos
- Yashma
- Lucky_Gh0$T
- Unc6032
- Cyberlock
- 303
- Deloitte
- Gucci
- Virtualization/Sandbox Evasion
- System Information Discovery
- Screen Capture
- Password Managers
- Input Capture
- User Execution
- Drive-By Compromise
- Data From Local System
- Windows Credential Manager
- Credentials From Web Browsers
- File And Directory Discovery
- Obfuscated Files Or Information
- Exfiltration Over C2 Channel
- Command And Scripting Interpreter
- Phishing
- Credentials From Password Stores
- Eddiestealer
- W_Tchdogs
- Australia And New Zealand
- Superloop
- Australia
- Smb/Windows Admin Shares
- Resource Hijacking
- Network Service Discovery
- Change Default File Association
- Escape To Host
- Docker
- Remote System Discovery
- Web Protocols
- Lateral Tool Transfer
- Exploitation For Client Execution
- Deploy Container
- Exploit Public-Facing Application
- External Remote Services
- Financial Theft
- Cameleon
- Romania
- Venom Rat
- Eastern Europe
- Bitdefender
- CVE-2023-20118
- Cisco
- Cve-2023-20118
- Eastern Asia
- Vicioustrap
- Macao Special Administrative Region
- Tetraloader
- Trimble
- Uat-6382
- Cve-2025-0944
- CVE-2025-0944
- Scheduled Task
- Reflective Code Loading
- Silver Fox
- Process Discovery
- Valleyrat
- File Deletion
- Powershell
- Rundll32
- China
- Obfuscated Files Or Information: Encrypted Or Encoded Data
- Malicious File
- Dynamic-Link Library Injection
- Masquerade Task Or Service
- Regsvr32
- Danabot
- Trickbot
- Qakbot
- Warmcookie
- Bumblebee
- Cetus
- Purehvnc
- Bytebreaker
- Viralgod
- Mexico
- Telcel
- Latin America And The Caribbean
- Peter Green Chilled
- Cellcom
-
Jun 16, 2025
Threat Actor Claims Breach of Scania’s Insurance Arm, 34,000 Files Allegedly Stolen
A threat actor using the alias "hensi" claims to have breached insurance.scania[.]com, a subdomain of Scania Financial Services, allegedly stealing 34,000 previously unpublished files. The breach, which reportedly targeted the Swedish manufacturer’s corporate insurance division, was announced on a forum on the dark web. Scania’s insurance services cover commercial vehicles—suggesting the stolen data may include sensitive customer and vehicle information, such as VINs. The targeted site is currently offline, citing maintenance, and Scania has yet to comment on the incident.
-
Jun 04, 2025
Threat Actor Claims Breach of Cyprus Airways
In June 2025, a threat actor named "Rip_Real_World" claimed to be selling data from Cyprus Airways, including over 45 GB of information. The breach allegedly includes passenger records from 2018 to June 2025, such as names, emails, phone numbers, travel dates, payment amounts, and document details. The actor also claimed to have real-time access to flight systems and data on 12 authorized personnel. The leak comprises 41 GB of passenger data and 2 GB of electronic ticket (ET) data.
-
May 21, 2025
Peter Green Chilled Reports Shuts Operations Down Following Ransomware Attack
In May 2025, Peter Green Chilled became the victim of a ransomware attack when yet unknown threat actors managed to gain access to its systems, forcing the company to halt operations. According to Peter Green, the attack has severely disrupted its ability to process orders and manage logistics, impacting its supply chain for fresh products supplied to major retailers such as Aldi, Sainsbury’s, and Tesco.