news
Breaking Cyber News From Cyberint
Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.
- All Items
- Israel
- Asia
- Business Services
- Handala
- Middle East
- Jobinfo
- Data Encrypted For Impact
- Shelter Locations In Israel
- Retail
- Saudi Games
- Saudi Arabia
- Cyber Fattah Team
- Ben Horin & Alexandrovitz
- Zachary Levi And Sons - Construction
- Sivim It
- Government
- Kibbutz Almog
- Manufacturing
- Saban Brands Israel
- Digitalghost
- Mprest
- Evil_Byte
- The Knesset
- Gonjeshke Darande
- Nobitex
- Sentap
- Kimia Farma
- Chemicals And Allied Products
- exclusive
- South-Eastern Asia
- Indonesia
- Transportation
- Hensi
- Scania
- Europe
- Northern Europe
- Sweden
- Tbn Israel
- Media
- Weizmann Institute Of Science
- Education
- Resistancetrench
- Israeli Air Force
- Israel Antiquities Authority
- Dienet
- Mirai
- Cve-2025-24016
- CVE-2025-24016
- United States
- Wazuh
- North America
- Clayoxtymus1337
- Technology
- Epsilor Electric Fuel
- Advanced Weapons And Equipment India
- Southern Asia
- India
- More_Eggs
- Fin6
- Cryptocurrency
- Alex Lab
- United Kingdom
- Zoldyck
- Edf Energy
- Critical Infrastructures
- Spearphishing Link
- Unix Shell
- Match Legitimate Name Or Location
- Credentials In Files
- Spectrum
- Ingress Tool Transfer
- Amos
- Disable Or Modify Tools
- Telecommunications
- Sudo And Sudo Caching
- Israel Defense Forces
- Food And Kindred Products
- Ghna
- Coca-Cola Europacific Partners
- Southern Europe
- Locauto
- Italy
- Automotive
- Mercadona
- Whitecoat
- Spain
- Ups
- Wow Health Solutions
- Healthcare
- Cyprus Airways
- Rip_Real_World
- Netsupport Rat
- Tel Aviv University
- Illeak
- Desec0X
- Numero
- Chaos
- Yashma
- Lucky_Gh0$T
- Unc6032
- Cyberlock
- 303
- Deloitte
- Gucci
- Virtualization/Sandbox Evasion
- System Information Discovery
- Screen Capture
- Password Managers
- Input Capture
- User Execution
- Drive-By Compromise
- Data From Local System
- Windows Credential Manager
- Credentials From Web Browsers
- File And Directory Discovery
- Obfuscated Files Or Information
- Exfiltration Over C2 Channel
- Command And Scripting Interpreter
- Phishing
- Credentials From Password Stores
- Eddiestealer
- W_Tchdogs
- Australia And New Zealand
- Superloop
- Australia
- Smb/Windows Admin Shares
- Resource Hijacking
- Network Service Discovery
- Change Default File Association
- Escape To Host
- Docker
- Remote System Discovery
- Web Protocols
- Lateral Tool Transfer
- Exploitation For Client Execution
- Deploy Container
- Exploit Public-Facing Application
- External Remote Services
- Financial Theft
- Cameleon
- Romania
- Venom Rat
- Eastern Europe
- Bitdefender
- CVE-2023-20118
- Cisco
- Cve-2023-20118
- Eastern Asia
- Vicioustrap
- Macao Special Administrative Region
- Tetraloader
- Trimble
- Uat-6382
- Cve-2025-0944
- CVE-2025-0944
- Scheduled Task
- Reflective Code Loading
- Silver Fox
- Process Discovery
- Valleyrat
- File Deletion
- Powershell
- Rundll32
- China
- Obfuscated Files Or Information: Encrypted Or Encoded Data
- Malicious File
- Dynamic-Link Library Injection
- Masquerade Task Or Service
- Regsvr32
- Danabot
- Trickbot
- Qakbot
- Warmcookie
- Bumblebee
- Cetus
- Purehvnc
- Bytebreaker
- Viralgod
- Mexico
- Telcel
- Latin America And The Caribbean
- Peter Green Chilled
- Cellcom
-
Jun 16, 2025
Handala Claims Breach of Weizmann Institute, 4TB of Data Stolen
On June 16, 2025, the pro-Palestinian hacktivist group Handala claimed to have breached the Weizmann Institute of Science in Israel, alleging the theft of 4 terabytes of confidential scientific data. The group threatened to publicly release the stolen documents, which they claim include sensitive research and internal communications. This attack follows previous claims by Handala targeting Israel’s security, law enforcement, and even educational systems.