Live Threat Monitoring

REAL-TIME CYBERSECURITY
INTELLIGENCE

For CISOs, SOC Analysts, Threat Researchers & Security Journalists

Breaking threats. Unfiltered truth. Zero corporate influence.

Browse Breach Database

Filter by sector, geography, threat level • View IOCs & MITRE ATT&CK mappings

Get Instant Alerts

Daily summaries + instant notifications on critical breaches & zero-days

16B+
Credentials Exposed
Source: Infostealer logs
100+
Oracle EBS Victims
Source: FBI Alert
24/7
Live Monitoring
7
Zero-Days Active
Source: CISA KEV

Active Incidents

HIGH

IDENTITY-BASED ATTACKS SURGE - 389% YoY GROWTH - 75% OF BREACHES

389% year-over-year growth in identity compromise. 75% of breaches involve compromised credentials. 50%+ of intrusions are identity-based. Convergence with auth bypass vulns (Fortinet, Ivanti) creates defensive asymmetry. Move from zero-trust theory to operational execution.

HIGH

MASS CREDENTIAL DATABASE - 149M RECORDS - INFOSTEALER COMPILATION

Discovered late January 2026. Gmail (48M), Facebook (17M), Instagram (6.5M), Netflix (3.4M), Yahoo (4M), Binance (420K), TikTok (780K). Prepared for dark web sale. ENABLE MFA ON ALL ACCOUNTS. Use unique passwords via password manager. Assume credential compromise.

HIGH

PANERA BREAD BREACH - SHINYHUNTERS - 14M CUSTOMER RECORDS LEAKED

ShinyHunters claimed breach Jan 30, 2026. 14M records including emails, phones, home addresses, account credentials. Data published to leak sites and dark web. Enables targeted phishing and identity theft. Reset Panera passwords immediately. Monitor for phishing using leaked PII.

WHAT WE COVER

Comprehensive cybersecurity intelligence across four key areas

ACTIVE THREAT INTELLIGENCE

  • Real-time breach notifications from Fortune 500 companies
  • Ransomware campaigns and extortion activities
  • Zero-day vulnerability disclosures
  • State-sponsored cyber attacks

COMPANY BREACH REPORTING

  • Detailed analysis of major data breaches
  • Impact assessments on compromised data
  • Corporate response timelines
  • Financial and operational consequences

CYBERSECURITY UPDATES

  • Critical vulnerability announcements
  • Threat actor profiles and methodologies
  • Industry-specific security warnings
  • Best practices and mitigation strategies

TECHNOLOGY NEWS & ANALYSIS

  • Emerging cyber threats and trends
  • Security product updates
  • Regulatory and compliance updates
  • Digital privacy policy coverage

2026 BREACH LANDSCAPE

Major data breaches and active incidents

Showing 20 of 20 breaches
ImpactThreatStatusActions
Panera Bread Data Breach (ShinyHunters)
Retail/Food Service
14 million customers, US/Canada food service sector
HIGHCRITICAL
Identity-Based Attack Surge - 389% YoY Growth
All Sectors
75% of breaches involve compromised credentials, 50%+ of intrusions
HIGHACTIVE
eScan Antivirus Supply Chain Compromise
Security Software
eScan users globally (enterprise + consumer), APAC + Europe focus
CRITICALCRITICAL
Fortinet FortiCloud SSO Auth Bypass (CVE-2026-24858)
Network Security
FortiOS, FortiManager, FortiAnalyzer, FortiProxy, FortiWeb
CRITICALCRITICAL
Mass Credential Database Exposure (149M Records)
All Sectors
Gmail 48M, Facebook 17M, Instagram 6.5M, Netflix 3.4M, Yahoo 4M+
HIGHCRITICAL
Ivanti EPMM Code Injection (CVE-2026-1281/CVE-2026-1340)
Enterprise MDM
All EPMM versions prior to 12.8.0, healthcare, finance, government MDM
CRITICALCRITICAL
Google IPIDEA Proxy Network Disruption
Threat Infrastructure
550+ threat groups (China, DPRK, Iran, Russia APTs + criminals)
HIGHACTIVE
Microsoft Office Security Bypass (CVE-2026-21509)
Enterprise
Office 2016/2019/2021/2024, Microsoft 365 Apps, Office Online Server
CRITICALCRITICAL
KONNI APT AI-Generated PowerShell Backdoor
Technology/Crypto
Software developers, blockchain/crypto teams, APAC region
HIGHACTIVE
Cisco UC/Webex Calling RCE (CVE-2026-20045)
Telecommunications
Unified CM 12.5/14.x/15.x, IM&P, Unity Connection, Webex Dedicated
CRITICALCRITICAL
Fortinet FortiCloud SAML SSO Bypass
Network Security
FortiGate firewalls including 7.4.9/7.4.10, FortiProxy, FortiSwitchManager
CRITICALCRITICAL
VoidLink AI-Built Cloud Malware Framework
Cloud Infrastructure
Cloud infrastructure, Linux servers, security teams
HIGHACTIVE
AI-Driven Android Click-Fraud Trojans (TensorFlow)
Mobile/Consumer
Android users (esp. Xiaomi GetApps), ad networks, BYOD enterprises
HIGHACTIVE
GNU InetUtils telnetd Auth Bypass (CVE-2026-24061)
Critical Infrastructure
Linux/Unix servers, legacy/embedded telnetd, OT/ICS gear
CRITICALCRITICAL
CISA KEV: Vite + Versa Concerto + Zimbra + eslint-config-prettier
Enterprise/DevOps
Dev tooling, SD-WAN controllers, email infrastructure, JS build pipelines
CRITICALCRITICAL
Chainlit AI Framework Vulnerabilities (ChainLeak)
AI/ML Platforms
AI/LLM application deployments, enterprises, academic institutions
HIGHCRITICAL
Qilin Ransomware Campaign - Nissan 9.6M Records
Automotive/Legal/Manufacturing
Nissan Motor Corp (9.6M accounts), Multiple Legal Firms, Manufacturing
CRITICALCRITICAL
Astaroth Banking Malware - WhatsApp Distribution
Financial Services
Brazilian banking users, WhatsApp Business deployments
HIGHACTIVE
AI Vulnerability Fastest-Growing Threat - WEF 2026
Enterprise
94% of leaders identify AI as top cyber risk driver
HIGHACTIVE
WhisperPair Bluetooth Fast Pair (CVE-2025-36911)
Consumer IoT
100+ million Bluetooth devices, 17 models from 10 manufacturers
CRITICALCRITICAL

THREAT ACTORS & CAMPAIGNS

Active hacking groups and ransomware operations

ACTIVE

eScan Supply Chain Attackers

SUPPLY_CHAIN

Unknown actors who compromised MicroWorld Technologies eScan antivirus update server Jan 20-21, 2026. Distributed trojanized Reload.exe and CONSCTLX.exe backdoor via legitimate update infrastructure. Malware blocks auto-remediation via hosts file modification. Signed with compromised eScan certificate.

Targets: eScan Antivirus Users, Endpoint Security, Enterprise/Consumer Systems
ACTIVE

IPIDEA Proxy Network Users (550+ Groups)

INFRASTRUCTURE

Coalition of 550+ threat groups including APTs from China, DPRK, Iran, and Russia plus criminal syndicates. Used IPIDEA residential proxy network for SaaS attacks, password spraying, and reconnaissance. Network partially disrupted by Google Jan 28-29, 2026. 5M bots still operational.

Targets: SaaS Environments, On-Premises Infrastructure, Identity Systems, Cloud Platforms
ACTIVE

ShinyHunters

DATA_THEFT

Prolific data breach threat group responsible for Panera Bread (14M records), Match Group, and CarMax breaches. Publishes stolen data to leak sites and dark web forums. Specializes in large-scale PII exfiltration enabling identity theft, targeted phishing, and credential stuffing attacks.

Targets: Retail, Food Service, Dating Platforms, Automotive, Consumer PII
CRITICAL

Fortinet SAML SSO Attackers

INITIAL_ACCESS

Automated attack campaign abusing FortiCloud SSO and SAML validation to compromise fully patched FortiGate firewalls. Creates rogue admin accounts in seconds, modifies VPN policies, exfiltrates configurations. 11,000+ exposed devices. Uses accounts like [email protected], [email protected].

Targets: FortiGate Firewalls, FortiProxy, FortiSwitchManager, Enterprise Perimeters
ACTIVE

TensorFlow Android Click-Fraud Operators

FINANCIAL

Criminal group deploying Android trojans using TensorFlow.js ML models to detect and click ads in hidden WebViews. Phantom mode renders invisible ads; signalling mode enables WebRTC remote screen control. 150K+ downloads via Xiaomi GetApps and modded APKs. C2: playstations[.]click, dllpgd[.]click.

Targets: Android Users, Ad Networks, BYOD Enterprises, Xiaomi Device Users
ACTIVE

KONNI APT (North Korea)

APT

North Korea-linked threat group running phishing campaigns against software developers and blockchain teams. Uses Discord-hosted ZIP archives with PDF lures and LNK files. Deploys AI-generated obfuscated PowerShell backdoors with scheduled task persistence. Targets APAC region for crypto theft and supply chain compromise.

Targets: Software Developers, Blockchain/Crypto Teams, CI/CD Pipelines, Wallet Infrastructure
ACTIVE

WhisperPair Exploiters

IOT_EXPLOIT

Actors exploiting CVE-2025-36911 Bluetooth Fast Pair vulnerability. Forced pairing within 50m range enables eavesdropping, location tracking via Google Find My Device network. Affects 100M+ devices including Google Pixel Buds, JBL, Jabra, Sony WH-1000XM5. Firmware-level vulnerability affecting both iPhone and Android users.

Targets: Consumer Bluetooth Devices, Enterprise Mobile Deployments, Executive Protection
ACTIVE

Astaroth Banking Trojan Operators

FINANCIAL

Brazilian banking malware group using novel WhatsApp Web distribution vector. Weaponized messages deliver obfuscated VBScript downloaders. Multi-stage infection chain with self-sustaining propagation via compromised WhatsApp accounts. Targets Brazilian online banking sessions for financial fraud.

Targets: Brazilian Banking Users, WhatsApp Business, Financial Institutions
CRITICAL

Reprompt Attack Operators

DATA_THEFT

Novel AI assistant exploitation technique targeting Microsoft Copilot. Bypasses DLP protections via session persistence exploitation. Exfiltrates corporate data after chat sessions terminate. Represents paradigm shift in AI security threats. Traditional security controls ineffective.

Targets: Microsoft Copilot Users, AI-Powered Enterprise Platforms, Corporate Data
CRITICAL

BRICKSTORM APT

APT

Advanced persistent threat with Rust-based backdoor variants (CISA MAR-10244545.r1.v2). Operates as background services with encrypted WebSocket C2 capabilities. Sophisticated persistence and defense evasion techniques. Actively targeting critical infrastructure sectors. Two new YARA detection rules released by CISA/NSA/CCCS.

Targets: Critical Infrastructure, Government Networks, Defense Industrial Base, Energy
CRITICAL

Shai-Hulud 2.0 Operators

SUPPLY_CHAIN

Self-replicating npm worm infected 12,000+ systems Nov 24-26. Created 25,000+ malicious repos at ~1,000/30min rate. Compromised Trust Wallet developer GitHub secrets, published malicious Chrome extension ($8.5M theft from 2,520 wallets). Harvested 775 GitHub PATs, 373 AWS, 300 GCP, 115 Azure credentials. Cross-victim supply chain attack.

Targets: DevOps, npm Ecosystem, Cryptocurrency, Cloud Infrastructure, CI/CD
CRITICAL

CrazyHunter Ransomware

RANSOMWARE

Go-based ransomware (Prince fork) targeting Taiwan healthcare. 6 confirmed facilities compromised. Uses BYOVD (Zemana driver exploit) for EDR evasion, AD exploitation, GPO lateral movement, ChaCha20 encryption. Advanced TTPs including partial file encryption (1:2 ratio) for speed.

Targets: Healthcare, Hospitals, Medical Facilities
CRITICAL

Kazu Ransomware Group

RANSOMWARE

Attacked Manage My Health (NZ) on Dec 30, 2025, compromising 125,000 patient records. Double-extortion tactics with $60,000 ransom demand. Released sample data on dark web leak site. Targets healthcare and patient portal infrastructure.

Targets: Healthcare, Patient Portals, Cloud-Hosted Medical Systems
ACTIVE

Clop Ransomware Group

RANSOMWARE

3 victims in January 2026 (MUTTI-PARMA.COM, CPJ.ORG, BORING.COM). Veteran ransomware gang with history of mass exploitation campaigns and supply chain attacks. Known for exploiting zero-days and file transfer vulnerabilities.

Targets: Manufacturing, Media, Various Sectors
ACTIVE

Akira Ransomware Group

RANSOMWARE

4 victims in January 2026 (Udall Law Firm, Morton Buildings, Gordon Companies). Known for targeting professional services and construction sectors with aggressive encryption and data theft operations.

Targets: Legal, Construction, Professional Services
CRITICAL

Initial Access Broker (IAB) - Reconnaissance Campaign

IAB

Systematic reconnaissance campaign Dec 25-28, 2025 testing 240+ different exploits against internet-facing systems. Logs all confirmed vulnerabilities for sale to ransomware gangs. GreyNoise intelligence confirms single operator building comprehensive vulnerability inventory for 2026 intrusion supply chain.

Targets: All Internet-Facing Infrastructure
CRITICAL

Tycoon 2FA PhaaS Operators

PHISHING

Phishing-as-a-Service platform exploiting email routing misconfigurations since May 2025. 13M+ malicious emails blocked in Oct 2025 alone. Sophisticated campaigns targeting voicemails, shared docs, HR comms, password resets, and financial scams via internal-looking spoofed emails.

Targets: Finance, HR, Executive Leadership, Enterprise
ACTIVE

Threat Actor "888"

DATA_THEFT

Breached European Space Agency external servers Dec 18-25. Exfiltrated 200GB including Bitbucket repos, CI/CD pipelines, API tokens, hardcoded secrets, and Terraform configs. Week-long persistence with sophisticated data theft.

Targets: Research, Space, Government
CRITICAL

UAT-9686 (APT)

APT

Chinese APT exploiting Cisco AsyncOS zero-day (CVE-2025-20393) since November 2025. CVSS 10.0 root-level RCE in email security appliances. No patch available. Sophisticated reconnaissance and exploitation capabilities.

Targets: Email Security, Enterprise Networks
CRITICAL

Earth Lamia & Jackpot Panda

APT

Chinese APT groups actively exploiting React2Shell (CVE-2025-55182) with CVSS 10.0 RCE. Targeting React Server Components globally since December 2025. State-sponsored operations with advanced persistence capabilities.

Targets: Web Applications, Cloud Infrastructure
CRITICAL

Gentlemen Ransomware

RANSOMWARE

Emerged August 2025, rapidly scaled to ~40 victims. Targeted Oltenia Energy Complex (Romania, 30% national power) on Dec 26. Sophisticated critical infrastructure targeting with encrypted IT systems while preserving OT operations.

Targets: Critical Infrastructure, Energy, Government
CRITICAL

Scattered Spider (Octo Tempest)

COLLECTIVE

Social engineering specialists behind Aflac 22.6M breach (June 2025), Erie Insurance, and Philadelphia Insurance attacks. Masters of vishing, credential relays, and MFA bypass via push notification fatigue. Also known as UNC3944.

Targets: Insurance, Healthcare, Enterprise
ACTIVE

TridentLocker Ransomware

RANSOMWARE

European targets including bpost breach. Full data publication when ransoms unpaid. Double extortion tactics employed with continued operations in Q4 2025.

Targets: European Organizations, Logistics
ACTIVE

CoinbaseCartel Ransomware

RANSOMWARE

Attacking semiconductor industry. Renesas Electronics confirmed victim. Aggressive ransom demands and data theft claims with supply chain targeting strategy.

Targets: Semiconductor, Technology
CRITICAL

BrickStorm (China-Backed)

APT

State-sponsored backdoor targeting VMware vSphere & Windows. Maintains long-term access (18+ months documented). APT-level sophistication with persistent implants.

Targets: Government, IT Infrastructure
CRITICAL

Qilin Ransomware Group

RANSOMWARE

10 victims claimed in January 2026 alone (TriVector Services, Gaviota, STESAD, Softlab SpA, Spring Grove Area School District, Retrofit Service, Anteriad, PTS Goldkist Industries, The Cressi, Telstar-Hommel). Most active ransomware group in 2026 with banking sector expertise and double-extortion tactics.

Targets: Education, Manufacturing, Financial Services, Professional Services
CRITICAL

Scattered Lapsus$ Hunters

DATA_THEFT

Claimed ESA breach in Sept 2024 via publicly disclosed vulnerability. Exfiltrated 500GB+ data including spacecraft mission details, contractor data (SpaceX, Airbus, Thales), CI/CD pipelines, API tokens. Offered 200GB+ on BreachForums Dec 2025. Vulnerability reportedly remains unpatched enabling persistent access.

Targets: Aerospace, Defense, Space Agencies, Government Contractors

2026 KEY STATISTICS

The scale of cybersecurity threats

0+

CVSS 10.0 Vulnerabilities (Active)

0+

Chrome Extension Victims

0+

Ivanti EPMM CVSS Score

0+

Credentials Exposed (2025)

0+

GNU telnetd CVE CVSS Score

0+

Microsoft Patch Tuesday CVEs

0+

Credentials Exposed (2026 YTD)

0+

CVSS 10.0 Active Vulnerabilities

WHAT MAKES US UNIQUE

12 core differentiators that set us apart

Unfiltered Truth

No corporate censorship - we report all breaches equally

24/7 Monitoring

Breaking news the moment vulnerabilities are discovered

No Vendor Ads

Complete editorial independence from security vendors

Technical Depth

From C-suite accessibility to security engineer detail

Accountability

Full breach lifecycle tracking and corporate response

Global Intel

Verified profiles on APT groups and ransomware gangs

Supply Chain

Full ecosystem impact analysis, not just initial victim

Verified Sources

Cross-referenced with CISA, NSA, and vendor disclosures

Industry Context

HIPAA, PCI-DSS, GDPR regulatory implications

Defense Guidance

Actionable threat hunting and mitigation strategies

No Sensationalism

Facts only - accurate headlines, no clickbait

Original Research

Investigative journalism into attack infrastructure

ABOUT CYBERREPORT.NEWS

Founded on the principle that cybersecurity information should be transparent, accurate, and accessible to all, CyberReport.News has become a trusted source for breaking security news and in-depth threat intelligence.

Our team includes veteran security researchers, former law enforcement cybercrime investigators, independent journalists, and threat intelligence analysts committed to exposing truth in an industry often clouded by corporate messaging and regulatory secrecy.

Our Commitment to Truth

  • Verified Information - All breaches cross-referenced with official announcements
  • No Censorship - Full transparency regardless of organization size
  • Technical Accuracy - In-depth analysis from security professionals
  • Timely Reporting - Real-time updates on breaking incidents
  • Source Attribution - Clear sourcing from CISA, NSA, vendor disclosures, and verified researchers
  • Accountability - Corrections made promptly when needed
  • Do No Harm - We never publish PII, personal data dumps, or exploit code that enables abuse
Cybersecurity Operations
50K+
Security Pros
5K+
Reports
100+
Breaches Tracked

WHO WE SERVE

Actionable intelligence for every security role

For SOC Teams

Enhance threat hunting with real-time breach intelligence, IOCs, and MITRE ATT&CK mappings to prioritize incident response and vulnerability management.

For CISOs

Stay ahead of board-level questions with executive summaries, industry-specific breach trends, and risk metrics to inform strategic security decisions.

For Journalists

Access verified breach data, source attribution, and timeline analysis for accurate security reporting with technical depth and credibility.

For Threat Researchers

Track threat actor campaigns, analyze attack patterns, and correlate breach data to uncover emerging TTPs and attribution indicators.

SUBSCRIBE FOR THREAT ALERTS

Daily briefing + instant critical alerts with IOCs and mitigation guidance

Delivered at 9:00 AM UTC • Critical alerts sent immediately • Includes technical indicators & remediation steps

Your data is stored securely. We never share your information.