Hacked Website Report Summary Attacker: Grased

Target: commune-menzeltemime.gov.tn Source: zone-h.org Victim Country: Tunisia Sector: Government – The target relates to local municipal governance and public services. Description: A breach was reported involving the municipal government site of Menzel Temime in Tunisia, indicating a potential compromise of local governance and public service integrity.…

Read More

Victim: Town of Orangeville Country : CA Actor: blacksuit Source: http://weg7sdx54bevnvulapqu6bpzwztryeflq3s23tegbmnhkbpqz637f2yd.onion/?id=Upj1jWSYRtsORyMO Discovered: 2025-03-29 20:28:39.800245 Published: 2025-03-29 20:27:29.004081 Description : The Town of Orangeville, located in Ontario, Canada, recently fell victim to a ransomware attack carried out by the cybercriminal group known as BlackSuit. As the municipal government, Orangeville’s council oversees essential services such as public safety, waste management, infrastructure, and community development.…
Read More

Report on Recent Cyber Attacks Attacker: c4t

Target: munipucayacu.gob.pe Source: zone-h.org Victim Country: Peru Sector: Government – Targeting municipal web presence, potentially affecting local governance and citizen services. Description: The Peruvian municipal website of Pucayacu was compromised, which may disrupt local administration and accessibility to public services.…

Read More
UK braced for ‘free speech’ row with JD Vance as far-right websites spurn Online Safety Act
Summary: UK officials face potential conflict with the US as far-right social media platforms resist compliance with the Online Safety Act, which aims to curb illegal content. Platforms like Gab and Kiwi Farms have publicly rejected Ofcom’s legal requests, citing concerns over perceived censorship. The British government remains firm on enforcing compliance, risking sanctions against non-compliant platforms despite US backlash.…
Read More
Apache Tomcat: CVE-2025-24813
CVE-2025-24813 is a critical vulnerability in Apache Tomcat that can allow remote, unauthenticated attackers to execute arbitrary code or access sensitive files. Organizations using vulnerable versions need to apply patches to protect their systems. Affected: Apache Tomcat

Keypoints :

Critical path equivalence vulnerability in Apache Tomcat, identified as CVE-2025-24813.…
Read More
College Cybersecurity Notes Module 2 The Security Environment
This guide covers essential cybersecurity concepts, including definitions of cybercrime, the principles of cybersecurity, types of threats, vulnerabilities, and secure software development practices. Understanding these elements is crucial for organizations and individuals to strengthen their defenses against increasing cyber threats. Affected: Cybersecurity sector, organizations, individuals

Keypoints :

Cybercrime includes illegal activities performed using computers or the internet, such as hacking and phishing.…
Read More
From Espionage to PsyOps: Tracking Operations and Bulletproof Providers of UACs in 2025
This report details the activities of Russia-aligned intrusion sets UAC-0050 and UAC-0006, which have been engaged in financially and espionage-motivated spam campaigns targeting various entities globally, particularly in Ukraine. They employ psychological operations, utilize malware for financial theft, and rely on bulletproof hosting providers to obfuscate their infrastructure.…
Read More

Here is the structured output based on the provided hacked website report list:

Target: https://aampco.gov.et Source: zone-h.org Victim Country: Ethiopia Sector: Government (The target is a government website related to national affairs in Ethiopia.) Description: The Ethiopian government’s official website was compromised by the attacker MoneroSHELL, highlighting vulnerabilities in governmental digital infrastructure.…

Read More
Product Walkthrough: How Datto BCDR Delivers Unstoppable Business Continuity
Summary: As modern IT environments face increasing risks, businesses are shifting focus from basic backups to comprehensive Business Continuity and Disaster Recovery (BCDR) solutions. Datto BCDR offers a streamlined platform that integrates local and cloud recovery options to ensure minimal downtime and data loss. With advanced features such as automated backup verification and 1-Click Disaster Recovery, organizations can enhance their resilience against IT disasters.…
Read More
PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps
Summary: A new campaign utilizing the PJobRAT Android malware has been detected, targeting users in Taiwan under the guise of chat applications. This malware, previously aimed at Indian military personnel, has evolved to harvest sensitive information while masquerading as messaging apps. Security researchers indicate its operation spanned nearly two years before pausing in October 2024.…
Read More
Investigative Journalists in Serbia Hit by Advanced Spyware Attack
Summary: Two Serbian journalists from the Balkan Investigative Reporting Network (BIRN) were targeted with Pegasus spyware, confirming a disturbing trend of digital surveillance against civil society in Serbia. This incident marks the third use of Pegasus spyware against Serbian activists in recent years, highlighting the ongoing repression and intimidation faced by journalists.…
Read More
Pakistan-Linked APT Exploits Youth Laptop Scheme in Cyberattack Targeting India
Summary: A new cybersecurity report by CYFIRMA reveals a sophisticated cyberattack targeting Indian users, allegedly led by a Pakistan-based APT group, APT36. The attackers created a fraudulent website mimicking the Indian Post Office to distribute malware to Windows and Android devices. The report details the tactics used by the group, including spear-phishing and the distribution of malicious applications, to compromise targets and exfiltrate sensitive data.…
Read More
Summary: A recent report by Group-IB uncovers the rising threat of “Classiscam” scams in Central Asia, wherein fraudsters exploit online platforms to deceive users into giving away financial information. These scams evolve from simple fake ads to intricate operations that utilize Telegram bots for phishing. The report stresses the need for vigilance among online marketplace users to avoid falling victim to these scams.…
Read More
Chinese FamousSparrow hackers deploy upgraded malware in attacks
Summary: A China-linked cyberespionage group named ‘FamousSparrow’ is actively using a new modular version of its backdoor ‘SparrowDoor’ to target a US-based trade organization and other entities, including a Mexican research institute and a Honduran government institution. ESET researchers have observed significant advancements in the malware’s capabilities, such as parallel command execution and a new plugin-based architecture.…
Read More
BlackLock Ransomware Operation Disrupted by Cybersecurity Firm
Summary: Resecurity has uncovered a Local File Include (LFI) vulnerability in the Data Leak Site (DLS) utilized by BlackLock Ransomware, enabling the exposure of sensitive operational data and IP addresses. This revelation assists in the investigation and disruption of the ransomware activity, which has rapidly grown, becoming increasingly aggressive with a significant rise in data leak incidents.…
Read More
Mozilla warns Windows users of critical Firefox sandbox escape flaw
Summary: Mozilla has released Firefox 136.0.4 to address a critical security vulnerability, tracked as CVE-2025-2857, that allows attackers to escape the browser’s sandbox on Windows systems. The flaw was reported by Mozilla developer Andrew McCreight and affects both standard and extended support releases of Firefox. Mozilla noted that this vulnerability bears similarities to a recently patched Chrome zero-day exploit.…
Read More
European officials increasingly certain Baltic Sea cable breaks are accidental, not sabotage
Summary: Recent submarine cable breaks in the Baltic Sea have raised concerns of Russian sabotage, but European officials suggest they are likely accidental, as investigations show no increase in faults proportional to maritime traffic. One vessel, the Eagle S, was implicated in the incidents but was eventually released, with investigations ongoing into the crew’s actions.…
Read More
Russian media, academia targeted in espionage campaign using Google Chrome zero-day exploit
Summary: Russian security researchers have uncovered a sophisticated malware targeting media and educational institutions in Russia, exploiting a zero-day vulnerability in Google Chrome known as CVE-2025-2783. Dubbed “Operation ForumTroll,” the attack involved phishing emails that led victims to malicious links, allowing for immediate infection. Kaspersky suggests that state-sponsored hackers are likely responsible for this intricate operation, which has since seen the malicious links disabled but cautions against future risks of exploitation.…
Read More