news
Breaking Cyber News From Cyberint
Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.
- All Items
- Handala
- Jobinfo
- Data Encrypted For Impact
- Business Services
- Middle East
- Asia
- Israel
- Shelter Locations In Israel
- Retail
- Saudi Arabia
- Saudi Games
- Cyber Fattah Team
- Ben Horin & Alexandrovitz
- Zachary Levi And Sons - Construction
- Sivim It
- Kibbutz Almog
- Government
- Manufacturing
- Saban Brands Israel
- Digitalghost
- Mprest
- The Knesset
- Evil_Byte
- Gonjeshke Darande
- Nobitex
- Chemicals And Allied Products
- Sentap
- South-Eastern Asia
- exclusive
- Indonesia
- Kimia Farma
- Sweden
- Europe
- Hensi
- Scania
- Northern Europe
- Transportation
- Tbn Israel
- Media
- Weizmann Institute Of Science
- Education
- Israeli Air Force
- Resistancetrench
- Dienet
- Israel Antiquities Authority
- Mirai
- CVE-2025-24016
- United States
- Cve-2025-24016
- Wazuh
- North America
- Clayoxtymus1337
- Epsilor Electric Fuel
- Technology
- Advanced Weapons And Equipment India
- Southern Asia
- India
- Fin6
- More_Eggs
- Alex Lab
- Cryptocurrency
- Edf Energy
- Critical Infrastructures
- United Kingdom
- Zoldyck
- Sudo And Sudo Caching
- Match Legitimate Name Or Location
- Amos
- Telecommunications
- Unix Shell
- Ingress Tool Transfer
- Spectrum
- Credentials In Files
- Disable Or Modify Tools
- Spearphishing Link
- Israel Defense Forces
- Ghna
- Coca-Cola Europacific Partners
- Food And Kindred Products
- Automotive
- Italy
- Southern Europe
- Locauto
- Mercadona
- Spain
- Whitecoat
- Ups
- Healthcare
- Wow Health Solutions
- Cyprus Airways
- Rip_Real_World
- Netsupport Rat
- Illeak
- Tel Aviv University
- Desec0X
- Cyberlock
- Lucky_Gh0$T
- Chaos
- Numero
- Yashma
- Unc6032
- Deloitte
- 303
- Gucci
- Credentials From Web Browsers
- Drive-By Compromise
- Eddiestealer
- Virtualization/Sandbox Evasion
- Password Managers
- File And Directory Discovery
- Windows Credential Manager
- User Execution
- Input Capture
- System Information Discovery
- Command And Scripting Interpreter
- Credentials From Password Stores
- Screen Capture
- Exfiltration Over C2 Channel
- Data From Local System
- Phishing
- Obfuscated Files Or Information
- Australia
- Superloop
- Australia And New Zealand
- W_Tchdogs
- Deploy Container
- Network Service Discovery
- Smb/Windows Admin Shares
- Exploit Public-Facing Application
- Docker
- Exploitation For Client Execution
- Web Protocols
- Remote System Discovery
- Lateral Tool Transfer
- Resource Hijacking
- Escape To Host
- External Remote Services
- Change Default File Association
- Venom Rat
- Eastern Europe
- Financial Theft
- Bitdefender
- Cameleon
- Romania
- Eastern Asia
- CVE-2023-20118
- Macao Special Administrative Region
- Cisco
- Vicioustrap
- Cve-2023-20118
- Trimble
- CVE-2025-0944
- Uat-6382
- Cve-2025-0944
- Tetraloader
- Reflective Code Loading
- Regsvr32
- Powershell
- Obfuscated Files Or Information: Encrypted Or Encoded Data
- Silver Fox
- Dynamic-Link Library Injection
- Masquerade Task Or Service
- Valleyrat
- File Deletion
- Malicious File
- Process Discovery
- Rundll32
- China
- Scheduled Task
- Warmcookie
- Trickbot
- Bumblebee
- Danabot
- Qakbot
- Cetus
- Purehvnc
- Bytebreaker
- Telcel
- Latin America And The Caribbean
- Viralgod
- Mexico
- Peter Green Chilled
- Cellcom
-
Jun 05, 2025
Threat Actor Claims Breach of Locauto Rent
In June 2025, a threat actor named Zoldyck claimed to have breached LocautoRent, an Italian car rental company, and to have gained access to its database. According to the threat actor, approximately 850,000 unique records belonging to LocautoRent's customers were taken, including sensitive data such as customer IDs, tax IDs, names, addresses, emails, phone numbers, and payment methods.