REAL-TIME CYBERSECURITY
INTELLIGENCE
For CISOs, SOC Analysts, Threat Researchers & Security Journalists
Breaking threats. Unfiltered truth. Zero corporate influence.
Browse Breach Database
Filter by sector, geography, threat level • View IOCs & MITRE ATT&CK mappings
Get Instant Alerts
Daily summaries + instant notifications on critical breaches & zero-days
Active Incidents
IDENTITY-BASED ATTACKS SURGE - 389% YoY GROWTH - 75% OF BREACHES
389% year-over-year growth in identity compromise. 75% of breaches involve compromised credentials. 50%+ of intrusions are identity-based. Convergence with auth bypass vulns (Fortinet, Ivanti) creates defensive asymmetry. Move from zero-trust theory to operational execution.
MASS CREDENTIAL DATABASE - 149M RECORDS - INFOSTEALER COMPILATION
Discovered late January 2026. Gmail (48M), Facebook (17M), Instagram (6.5M), Netflix (3.4M), Yahoo (4M), Binance (420K), TikTok (780K). Prepared for dark web sale. ENABLE MFA ON ALL ACCOUNTS. Use unique passwords via password manager. Assume credential compromise.
PANERA BREAD BREACH - SHINYHUNTERS - 14M CUSTOMER RECORDS LEAKED
ShinyHunters claimed breach Jan 30, 2026. 14M records including emails, phones, home addresses, account credentials. Data published to leak sites and dark web. Enables targeted phishing and identity theft. Reset Panera passwords immediately. Monitor for phishing using leaked PII.
WHAT WE COVER
Comprehensive cybersecurity intelligence across four key areas
ACTIVE THREAT INTELLIGENCE
- •Real-time breach notifications from Fortune 500 companies
- •Ransomware campaigns and extortion activities
- •Zero-day vulnerability disclosures
- •State-sponsored cyber attacks
COMPANY BREACH REPORTING
- •Detailed analysis of major data breaches
- •Impact assessments on compromised data
- •Corporate response timelines
- •Financial and operational consequences
CYBERSECURITY UPDATES
- •Critical vulnerability announcements
- •Threat actor profiles and methodologies
- •Industry-specific security warnings
- •Best practices and mitigation strategies
TECHNOLOGY NEWS & ANALYSIS
- •Emerging cyber threats and trends
- •Security product updates
- •Regulatory and compliance updates
- •Digital privacy policy coverage
2026 BREACH LANDSCAPE
Major data breaches and active incidents
| Impact | Threat | Status | Actions | |
|---|---|---|---|---|
Panera Bread Data Breach (ShinyHunters) Retail/Food Service | 14 million customers, US/Canada food service sector | HIGH | CRITICAL | |
Identity-Based Attack Surge - 389% YoY Growth All Sectors | 75% of breaches involve compromised credentials, 50%+ of intrusions | HIGH | ACTIVE | |
eScan Antivirus Supply Chain Compromise Security Software | eScan users globally (enterprise + consumer), APAC + Europe focus | CRITICAL | CRITICAL | |
Fortinet FortiCloud SSO Auth Bypass (CVE-2026-24858) Network Security | FortiOS, FortiManager, FortiAnalyzer, FortiProxy, FortiWeb | CRITICAL | CRITICAL | |
Mass Credential Database Exposure (149M Records) All Sectors | Gmail 48M, Facebook 17M, Instagram 6.5M, Netflix 3.4M, Yahoo 4M+ | HIGH | CRITICAL | |
Ivanti EPMM Code Injection (CVE-2026-1281/CVE-2026-1340) Enterprise MDM | All EPMM versions prior to 12.8.0, healthcare, finance, government MDM | CRITICAL | CRITICAL | |
Google IPIDEA Proxy Network Disruption Threat Infrastructure | 550+ threat groups (China, DPRK, Iran, Russia APTs + criminals) | HIGH | ACTIVE | |
Microsoft Office Security Bypass (CVE-2026-21509) Enterprise | Office 2016/2019/2021/2024, Microsoft 365 Apps, Office Online Server | CRITICAL | CRITICAL | |
KONNI APT AI-Generated PowerShell Backdoor Technology/Crypto | Software developers, blockchain/crypto teams, APAC region | HIGH | ACTIVE | |
Cisco UC/Webex Calling RCE (CVE-2026-20045) Telecommunications | Unified CM 12.5/14.x/15.x, IM&P, Unity Connection, Webex Dedicated | CRITICAL | CRITICAL | |
Fortinet FortiCloud SAML SSO Bypass Network Security | FortiGate firewalls including 7.4.9/7.4.10, FortiProxy, FortiSwitchManager | CRITICAL | CRITICAL | |
VoidLink AI-Built Cloud Malware Framework Cloud Infrastructure | Cloud infrastructure, Linux servers, security teams | HIGH | ACTIVE | |
AI-Driven Android Click-Fraud Trojans (TensorFlow) Mobile/Consumer | Android users (esp. Xiaomi GetApps), ad networks, BYOD enterprises | HIGH | ACTIVE | |
GNU InetUtils telnetd Auth Bypass (CVE-2026-24061) Critical Infrastructure | Linux/Unix servers, legacy/embedded telnetd, OT/ICS gear | CRITICAL | CRITICAL | |
CISA KEV: Vite + Versa Concerto + Zimbra + eslint-config-prettier Enterprise/DevOps | Dev tooling, SD-WAN controllers, email infrastructure, JS build pipelines | CRITICAL | CRITICAL | |
Chainlit AI Framework Vulnerabilities (ChainLeak) AI/ML Platforms | AI/LLM application deployments, enterprises, academic institutions | HIGH | CRITICAL | |
Qilin Ransomware Campaign - Nissan 9.6M Records Automotive/Legal/Manufacturing | Nissan Motor Corp (9.6M accounts), Multiple Legal Firms, Manufacturing | CRITICAL | CRITICAL | |
Astaroth Banking Malware - WhatsApp Distribution Financial Services | Brazilian banking users, WhatsApp Business deployments | HIGH | ACTIVE | |
AI Vulnerability Fastest-Growing Threat - WEF 2026 Enterprise | 94% of leaders identify AI as top cyber risk driver | HIGH | ACTIVE | |
WhisperPair Bluetooth Fast Pair (CVE-2025-36911) Consumer IoT | 100+ million Bluetooth devices, 17 models from 10 manufacturers | CRITICAL | CRITICAL |
THREAT ACTORS & CAMPAIGNS
Active hacking groups and ransomware operations
eScan Supply Chain Attackers
Unknown actors who compromised MicroWorld Technologies eScan antivirus update server Jan 20-21, 2026. Distributed trojanized Reload.exe and CONSCTLX.exe backdoor via legitimate update infrastructure. Malware blocks auto-remediation via hosts file modification. Signed with compromised eScan certificate.
IPIDEA Proxy Network Users (550+ Groups)
Coalition of 550+ threat groups including APTs from China, DPRK, Iran, and Russia plus criminal syndicates. Used IPIDEA residential proxy network for SaaS attacks, password spraying, and reconnaissance. Network partially disrupted by Google Jan 28-29, 2026. 5M bots still operational.
ShinyHunters
Prolific data breach threat group responsible for Panera Bread (14M records), Match Group, and CarMax breaches. Publishes stolen data to leak sites and dark web forums. Specializes in large-scale PII exfiltration enabling identity theft, targeted phishing, and credential stuffing attacks.
Fortinet SAML SSO Attackers
Automated attack campaign abusing FortiCloud SSO and SAML validation to compromise fully patched FortiGate firewalls. Creates rogue admin accounts in seconds, modifies VPN policies, exfiltrates configurations. 11,000+ exposed devices. Uses accounts like [email protected], [email protected].
TensorFlow Android Click-Fraud Operators
Criminal group deploying Android trojans using TensorFlow.js ML models to detect and click ads in hidden WebViews. Phantom mode renders invisible ads; signalling mode enables WebRTC remote screen control. 150K+ downloads via Xiaomi GetApps and modded APKs. C2: playstations[.]click, dllpgd[.]click.
KONNI APT (North Korea)
North Korea-linked threat group running phishing campaigns against software developers and blockchain teams. Uses Discord-hosted ZIP archives with PDF lures and LNK files. Deploys AI-generated obfuscated PowerShell backdoors with scheduled task persistence. Targets APAC region for crypto theft and supply chain compromise.
WhisperPair Exploiters
Actors exploiting CVE-2025-36911 Bluetooth Fast Pair vulnerability. Forced pairing within 50m range enables eavesdropping, location tracking via Google Find My Device network. Affects 100M+ devices including Google Pixel Buds, JBL, Jabra, Sony WH-1000XM5. Firmware-level vulnerability affecting both iPhone and Android users.
Astaroth Banking Trojan Operators
Brazilian banking malware group using novel WhatsApp Web distribution vector. Weaponized messages deliver obfuscated VBScript downloaders. Multi-stage infection chain with self-sustaining propagation via compromised WhatsApp accounts. Targets Brazilian online banking sessions for financial fraud.
Reprompt Attack Operators
Novel AI assistant exploitation technique targeting Microsoft Copilot. Bypasses DLP protections via session persistence exploitation. Exfiltrates corporate data after chat sessions terminate. Represents paradigm shift in AI security threats. Traditional security controls ineffective.
BRICKSTORM APT
Advanced persistent threat with Rust-based backdoor variants (CISA MAR-10244545.r1.v2). Operates as background services with encrypted WebSocket C2 capabilities. Sophisticated persistence and defense evasion techniques. Actively targeting critical infrastructure sectors. Two new YARA detection rules released by CISA/NSA/CCCS.
Shai-Hulud 2.0 Operators
Self-replicating npm worm infected 12,000+ systems Nov 24-26. Created 25,000+ malicious repos at ~1,000/30min rate. Compromised Trust Wallet developer GitHub secrets, published malicious Chrome extension ($8.5M theft from 2,520 wallets). Harvested 775 GitHub PATs, 373 AWS, 300 GCP, 115 Azure credentials. Cross-victim supply chain attack.
CrazyHunter Ransomware
Go-based ransomware (Prince fork) targeting Taiwan healthcare. 6 confirmed facilities compromised. Uses BYOVD (Zemana driver exploit) for EDR evasion, AD exploitation, GPO lateral movement, ChaCha20 encryption. Advanced TTPs including partial file encryption (1:2 ratio) for speed.
Kazu Ransomware Group
Attacked Manage My Health (NZ) on Dec 30, 2025, compromising 125,000 patient records. Double-extortion tactics with $60,000 ransom demand. Released sample data on dark web leak site. Targets healthcare and patient portal infrastructure.
Clop Ransomware Group
3 victims in January 2026 (MUTTI-PARMA.COM, CPJ.ORG, BORING.COM). Veteran ransomware gang with history of mass exploitation campaigns and supply chain attacks. Known for exploiting zero-days and file transfer vulnerabilities.
Akira Ransomware Group
4 victims in January 2026 (Udall Law Firm, Morton Buildings, Gordon Companies). Known for targeting professional services and construction sectors with aggressive encryption and data theft operations.
Initial Access Broker (IAB) - Reconnaissance Campaign
Systematic reconnaissance campaign Dec 25-28, 2025 testing 240+ different exploits against internet-facing systems. Logs all confirmed vulnerabilities for sale to ransomware gangs. GreyNoise intelligence confirms single operator building comprehensive vulnerability inventory for 2026 intrusion supply chain.
Tycoon 2FA PhaaS Operators
Phishing-as-a-Service platform exploiting email routing misconfigurations since May 2025. 13M+ malicious emails blocked in Oct 2025 alone. Sophisticated campaigns targeting voicemails, shared docs, HR comms, password resets, and financial scams via internal-looking spoofed emails.
Threat Actor "888"
Breached European Space Agency external servers Dec 18-25. Exfiltrated 200GB including Bitbucket repos, CI/CD pipelines, API tokens, hardcoded secrets, and Terraform configs. Week-long persistence with sophisticated data theft.
UAT-9686 (APT)
Chinese APT exploiting Cisco AsyncOS zero-day (CVE-2025-20393) since November 2025. CVSS 10.0 root-level RCE in email security appliances. No patch available. Sophisticated reconnaissance and exploitation capabilities.
Earth Lamia & Jackpot Panda
Chinese APT groups actively exploiting React2Shell (CVE-2025-55182) with CVSS 10.0 RCE. Targeting React Server Components globally since December 2025. State-sponsored operations with advanced persistence capabilities.
Gentlemen Ransomware
Emerged August 2025, rapidly scaled to ~40 victims. Targeted Oltenia Energy Complex (Romania, 30% national power) on Dec 26. Sophisticated critical infrastructure targeting with encrypted IT systems while preserving OT operations.
Scattered Spider (Octo Tempest)
Social engineering specialists behind Aflac 22.6M breach (June 2025), Erie Insurance, and Philadelphia Insurance attacks. Masters of vishing, credential relays, and MFA bypass via push notification fatigue. Also known as UNC3944.
TridentLocker Ransomware
European targets including bpost breach. Full data publication when ransoms unpaid. Double extortion tactics employed with continued operations in Q4 2025.
CoinbaseCartel Ransomware
Attacking semiconductor industry. Renesas Electronics confirmed victim. Aggressive ransom demands and data theft claims with supply chain targeting strategy.
BrickStorm (China-Backed)
State-sponsored backdoor targeting VMware vSphere & Windows. Maintains long-term access (18+ months documented). APT-level sophistication with persistent implants.
Qilin Ransomware Group
10 victims claimed in January 2026 alone (TriVector Services, Gaviota, STESAD, Softlab SpA, Spring Grove Area School District, Retrofit Service, Anteriad, PTS Goldkist Industries, The Cressi, Telstar-Hommel). Most active ransomware group in 2026 with banking sector expertise and double-extortion tactics.
Scattered Lapsus$ Hunters
Claimed ESA breach in Sept 2024 via publicly disclosed vulnerability. Exfiltrated 500GB+ data including spacecraft mission details, contractor data (SpaceX, Airbus, Thales), CI/CD pipelines, API tokens. Offered 200GB+ on BreachForums Dec 2025. Vulnerability reportedly remains unpatched enabling persistent access.
2026 KEY STATISTICS
The scale of cybersecurity threats
CVSS 10.0 Vulnerabilities (Active)
Chrome Extension Victims
Ivanti EPMM CVSS Score
Credentials Exposed (2025)
GNU telnetd CVE CVSS Score
Microsoft Patch Tuesday CVEs
Credentials Exposed (2026 YTD)
CVSS 10.0 Active Vulnerabilities
WHAT MAKES US UNIQUE
12 core differentiators that set us apart
Unfiltered Truth
No corporate censorship - we report all breaches equally
24/7 Monitoring
Breaking news the moment vulnerabilities are discovered
No Vendor Ads
Complete editorial independence from security vendors
Technical Depth
From C-suite accessibility to security engineer detail
Accountability
Full breach lifecycle tracking and corporate response
Global Intel
Verified profiles on APT groups and ransomware gangs
Supply Chain
Full ecosystem impact analysis, not just initial victim
Verified Sources
Cross-referenced with CISA, NSA, and vendor disclosures
Industry Context
HIPAA, PCI-DSS, GDPR regulatory implications
Defense Guidance
Actionable threat hunting and mitigation strategies
No Sensationalism
Facts only - accurate headlines, no clickbait
Original Research
Investigative journalism into attack infrastructure
ABOUT CYBERREPORT.NEWS
Founded on the principle that cybersecurity information should be transparent, accurate, and accessible to all, CyberReport.News has become a trusted source for breaking security news and in-depth threat intelligence.
Our team includes veteran security researchers, former law enforcement cybercrime investigators, independent journalists, and threat intelligence analysts committed to exposing truth in an industry often clouded by corporate messaging and regulatory secrecy.
Our Commitment to Truth
- Verified Information - All breaches cross-referenced with official announcements
- No Censorship - Full transparency regardless of organization size
- Technical Accuracy - In-depth analysis from security professionals
- Timely Reporting - Real-time updates on breaking incidents
- Source Attribution - Clear sourcing from CISA, NSA, vendor disclosures, and verified researchers
- Accountability - Corrections made promptly when needed
- Do No Harm - We never publish PII, personal data dumps, or exploit code that enables abuse

WHO WE SERVE
Actionable intelligence for every security role
For SOC Teams
Enhance threat hunting with real-time breach intelligence, IOCs, and MITRE ATT&CK mappings to prioritize incident response and vulnerability management.
For CISOs
Stay ahead of board-level questions with executive summaries, industry-specific breach trends, and risk metrics to inform strategic security decisions.
For Journalists
Access verified breach data, source attribution, and timeline analysis for accurate security reporting with technical depth and credibility.
For Threat Researchers
Track threat actor campaigns, analyze attack patterns, and correlate breach data to uncover emerging TTPs and attribution indicators.
SUBSCRIBE FOR THREAT ALERTS
Daily briefing + instant critical alerts with IOCs and mitigation guidance
Delivered at 9:00 AM UTC • Critical alerts sent immediately • Includes technical indicators & remediation steps
Your data is stored securely. We never share your information.