Stay ahead with daily updates on cyber attacks, data breaches, and ransomware threats. Explore deep threat research, hacking news, and AI-powered cyber monitoring— hendryadrian.com — #ThreatResearch #CybersecurityNews #CyberAttack #DataBreach #RansomMonitor #Hacked! #Youtube #PoweredbyAI
Threat Research
- Stranger Strings: Yurei Ransomware Operator Toolkit Exposed
- Keep your finger on Pulse. Mythic Likho cyberattacks against Russia’s critical information infrastructure
- The Week in Vulnerabilities: AI Frameworks, VMware, and Critical ICS Exposure
- New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay
- Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments
- How we caught the Axios supply chain attack
Security News
- UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
- Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
- China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing
- EU cyber agency attributes major data breach to TeamPCP hacking group
- LinkedIn secretely scans for 6,000+ Chrome extensions, collects data
- CISA gives agencies two weeks to patch video conferencing bug exploited by Chinese hackers
Cyber Attack
- C2K: Northern Ireland School IT System Targeted by Cyberattack Ahead of Exam Season
- AiLock Attack Hits Piet Vijverberg and Berning & Söhne
- HASBRO, INC. Cybersecurity Incident Details – Board Cybersecurity
- DragonForce Breaches Asmar, SUTEX, Bunch, Klean, Northstar, Acme, J Brand, CES, Singita, ATPkg, Congoleum, Greenway, FHW
- The EU’s AWS “Master Key”: How a Compromised Trivy Update Leaked 340GB of Data
- The BPO Backdoor: How “Mr. Raccoon” Swiped 13 Million Adobe Support Tickets
Interesting Stuff
- The Biggest Supply Chain Attack of 2026 Was Unfolding While We Were at RSAC, the FBI Director’s Gmail Got Popped, and a $10B AI Startup’s Biometrics Hit the Auction Block
- Gmail’s New Rename Feature Could Add Spam and Phishing to Your Inbox
- Kerberos Constrained Delegation Exploitation
- Cybersecurity Can Learn from the Artemis Launch
- [2/3] Security+ Domains Explained: What to Study (and What to Ignore)
- Which Code Vulnerabilities Actually Get Fixed? New Code Security Data from 50,000+ Repos
Ransom Monitor
- Ransom! Advanced Vehicle Assemblies (APR-2026)
- Ransom! Community Connections (APR-2026)
- Ransom! coronapa.com (APR-2026)
- Ransom! kramer-nsc.at (APR-2026)
- Ransom! BJ Grupo (APR-2026)
- Ransom! Dubosson Fr,ères SA (APR-2026)
- Ransom! Southeastern Conference of Seventh-day Adventists (APR-2026)
- Ransom! American Vintage Home, Briggs Plumbing Products, Genco Manufacturing, American Vintage Hom… (APR-2026)
- Ransom! Asmar Schor & McKenna (APR-2026)
- Ransom! Tscherne Consulting Steuerberatung GmbH (APR-2026)
