Intelligence Archives

STATUS: ENCRYPTED_FILES_READY

SEARCH
NO_MATCHING_FILES_FOUND
[FILE_063] // 2026.05.01

UK Breaches Survey: AI Outpacing Security

The 2026 UK Government report reveals that while AI adoption is surging, only 25% of firms have implemented specific security protocols.

Decrypt File
[FILE_062] // 2026.04.30

Anthropic Mythos: The AI Red Teamer

Anthropic's latest model demonstrates an unprecedented ability to identify and exploit zero-day vulnerabilities at "industrial" speeds.

Decrypt File
[FILE_061] // 2026.04.30

EtherRAT: Admin Tool Spoofing via GitHub

Threat actors are using SEO poisoning and "facade" repositories to distribute malicious installers disguised as common utilities like PsExec.

Decrypt File
[FILE_060] // 2026.04.29

CISA Accelerates Zero Trust for OT

New guidance focuses on accelerating Zero Trust adoption in Operational Technology (OT) environments to protect critical infrastructure.

Decrypt File
[FILE_059] // 2026.04.25

Critical Vulnerability: PicoClaw RCE

CVE-2026-6987 identifies a 9.8 severity command injection vulnerability in PicoClaw's Web Launcher Management Plane.

Decrypt File
[FILE_058] // 2026.04.24

Cisco Catalyst SD-WAN Under Attack

CISA added three critical vulnerabilities in the Cisco Catalyst SD-WAN Manager to its Known Exploited Vulnerabilities catalog.

Decrypt File
[FILE_057] // 2026.04.24

Oracle April CPU: 480+ Fixes

Oracle's massive quarterly update addresses over 480 security flaws across Communications, Fusion Middleware, and Java platforms.

Decrypt File
[FILE_056] // 2026.04.24

Germany NIS2: The Compliance Gap

Reports show only one-third of German organizations met the March 6 registration deadline for NIS2 compliance.

Decrypt File
[FILE_055] // 2026.04.24

Booking.com: High-Value Context Leak

A breach exposing travel dates has enabled a wave of highly believable follow-on phishing attacks against platform users.

Decrypt File
[FILE_054] // 2026.04.21

Vercel: The OAuth Supply Chain Breach

A compromised third-party AI tool was used to hijack a Vercel employee's OAuth token, leading to internal lateral movement.

Decrypt File
[FILE_053] // 2026.04.09

U.S. Cyber Strategy Shifts Posture

New strategy signals greater latitude for private-sector offensive operations to deter nation-state ransomware gangs.

Decrypt File
[FILE_052] // 2026.03.30

Stryker: The Handala Wipe Attack

Handala utilized Microsoft Intune to wipe Windows-based devices at medical giant Stryker, causing widespread outages.

Decrypt File
[FILE_051] // 2026.03.25

Navia: 2.7 Million Records Exposed

An exposed API vulnerability at Navia led to the theft of Social Security numbers and sensitive health plan information.

Decrypt File
[FILE_050] // 2026.03.20

CarGurus: 12 Million Users Compromised

Online automotive marketplace confirmed a compromise involving customer account metadata and PII for over 12 million users.

Decrypt File
[FILE_049] // 2026.03.15

University of Hawaiʻi Ransomware

A major ransomware event compromised personal data of 1.2 million individuals, including driver's licenses and SSNs.

Decrypt File
[FILE_048] // 2026.03.09

LexisNexis: Reach2Shell Exploitation

Hackers successfully breached LexisNexis servers by exploiting an unpatched high-severity vulnerability to access contact data.

Decrypt File
[FILE_047] // 2026.03.09

Star Citizen: CIG Data Disclosure

Cloud Imperium Games confirmed unauthorized parties accessed user account information, including names and birthdates.

Decrypt File
[FILE_046] // 2026.03.09

AkzoNobel U.S. Site Targeted

Chemical giant AkzoNobel confirmed a cyberattack targeting its U.S. infrastructure, resulting in data exfiltration.

Decrypt File
[FILE_045] // 2026.03.09

HungerRush Extortion Campaign

Threat actor mass-emailed restaurant patrons of HungerRush to demand extortion payments after a server compromise.

Decrypt File
[FILE_044] // 2026.03.02

UMMC Recovery: Systems Online

University of Mississippi Medical Center reopened clinics following a month-long recovery from a severe ransomware attack.

Decrypt File