Rankiteo Logo
Rankiteo
Leader in Cyber Underwriting

The Rankiteo MCP server is now available.

Discover MCP
TOP 100 INCIDENTS

Top Cyber Incidents

Cyber incidents ranked by their real impact on company scores. The ranking combines the number of companies affected, severity, and impact, revealing which incidents truly moved the needle across the portfolio.

17,214
Incidents Tracked
19,284
Company Scores Impacted
11384
Critical Severity
2094
Attack Categories

Showing 17214 of 17214 incidents

1
🏢12companies impacted
📉37impact score
💥5impact

**Cybercrime in 2025: A Global Threat Surpassing National Economies** Cybercrime continues to escalate into one of the world’s most lucrative illicit industries, with damages projected to reach **$10.5 trillion USD globally in 2025** a figure that, if measured as a country, would rank as the **thir

Ransomware, Data Breach, Supply-Chain Attack, Cryptocurrency CrimeHospitalityPharmaceutical ManufacturingTechnology, Information and InternetFinancial ServicesSoftware DevelopmentEntertainment ProvidersIT Services and IT ConsultingMotor Vehicle ManufacturingHospitals and Health CareTransportation, Logistics, Supply Chain and StorageActor: Akira, LockBit, RansomHub, FOG, PLAY, ShinyHunters, Clop, Lazarus Group, North Korea's state-sponsor2025-12-11T00:00:00
2
🏢11companies impacted
📉36.5impact score
💥5impact

**Ransomware Attacks Surge 30% in Q4 2025, Targeting Critical Sectors and Supply Chains** Ransomware activity has spiked sharply, with attacks increasing by **30% in the last four months of 2025** compared to the first nine months of the year. Cybersecurity firm **Cyble** recorded **2,018 claimed a

RansomwareInternational Trade and DevelopmentComputer and Network SecurityActor: Qilin, Akira, Sinobi, The Gentlemen, CL0P, Everest, Rhysida, RansomHouse, INC Ransom, Nitrogen, Anub2026-01-01T00:00:00
3
🏢9companies impacted
📉36.1impact score
💥8impact

**Ransomware in 2025–2026: Evolving Threats, Rising Costs, and High-Profile Attacks** Ransomware remains a critical threat to governments, businesses, and critical infrastructure, disrupting healthcare, fuel distribution, retail, and identity security. Financial and operational impacts have intensi

RansomwareHospitalityConsumer ServicesSpectator SportsE-Learning ProvidersRetailSoftware DevelopmentInformation Technology & ServicesHospitals and Health CareActor: Clop ransomware gang, Vice Society, LockBit 5.0, Medusa ransomware gang, Interlock ransomware, Pay2K2024-12-25T00:00:00
4
🏢10companies impacted
📉35.8impact score
💥4impact

**The "Mother of All Breaches": 26 Billion Records Exposed in Unprecedented Data Leak** Security researchers have uncovered what may be the largest compilation of stolen credentials in history a 12-terabyte database dubbed the **"Mother of All Breaches" (MOAB)**, containing **26 billion records** f

Data BreachSoftware DevelopmentTechnology, Information and InternetGovernment AdministrationEntertainment ProvidersMusicians2025-01-01T00:00:00
5

Broadcom

Critical (100)
🏢8companies impacted
📉35impact score
💥5impact

Broadcom, a global technology leader valued at hundreds of billions, was among the high-profile victims of **Cl0p’s ransomware attack** exploiting a **zero-day vulnerability in Oracle’s E-Business Suite (CVE-2025-61882 and CVE-2025-21884)**. The cybercriminal group **exfiltrated sensitive corporate

Ransomware, Data Breach, Zero-Day ExploitSemiconductor ManufacturingActor: Cl0p (Clop)2025-06-16T00:00:00
6
🏢8companies impacted
📉35impact score
💥5impact

**Loblaw Faces Alleged Massive Data Breach as Threat Actor Demands Response** A threat actor operating under the handle *"igotafeeling"* on the *DarkWeb Informer* forum has claimed to have breached **Loblaw**, Canada’s largest food and pharmacy retailer, which owns brands like *President’s Choice,

Data BreachFinancial ServicesRetailRetail GroceriesActor: igotafeeling2026-03-13T00:00:00
7
🏢6companies impacted
📉34.6impact score
💥8impact

**Cyber Retaliation Likely as U.S.-Israeli Strikes Trigger Iranian Digital Disruptions** On March 1, 2026, a series of cyber operations unfolded alongside joint U.S.-Israeli airstrikes targeting Iran, signaling potential escalation in digital warfare. Cybersecurity experts reported multiple breache

Cyber Espionage, Psychological Operation, DDoS, Wiper AttackIT Services and IT ConsultingActor: Pro-Iranian Hacktivist Groups, State-Backed Iranian Groups2026-03-01T00:00:00
8
🏢7companies impacted
📉34.5impact score
💥5impact

**Ransomware in 2025: A Systemic Threat Disrupting Global Supply Chains and Critical Services** In 2025, ransomware evolved from isolated IT disruptions into a systemic risk, threatening national supply chains, essential services, and entire industries. Cybersecurity Ventures projects the global co

RansomwareRetailSoftware DevelopmentInformation Technology & ServicesIT Services and IT ConsultingHospitals and Health CareMotor Vehicle ManufacturingMedical and Diagnostic Laboratories2025-01-01T00:00:00
9
🏢7companies impacted
📉34.5impact score
💥5impact

**Volkswagen Faces Data Extortion Threat from 8Base Ransomware Group** Volkswagen Group is responding to claims by the ransomware group **8Base**, which alleges it stole and leaked sensitive data from the automaker. While Volkswagen maintains that its **core IT infrastructure remains unaffected**,

Data ExtortionMotor Vehicle ManufacturingActor: 8Base Ransomware Group2025-10-19T00:00:00
10
🏢7companies impacted
📉34.5impact score
💥5impact

**FBI Network Breach Targets Surveillance Systems** Hackers have reportedly compromised an FBI network used to manage wiretaps and foreign intelligence surveillance warrants, according to a CNN report citing an anonymous source. The breach was confirmed by an FBI spokesperson, who stated that the b

Network BreachIT Services and IT ConsultingGovernment AdministrationTelecommunicationsLaw EnforcementDesign Services2026-03-05T00:00:00
11
🏢7companies impacted
📉34.5impact score
💥5impact

**Cyberattacks Surge in the Automotive Industry: Key Incidents from 2024–2025** The automotive sector has become a prime target for cybercriminals, with attacks ranging from ransomware extortion to large-scale data breaches exposing sensitive customer and operational data. Between 2024 and 2025, ma

ransomware, data breach, third-party breach, cloud misconfigurationIndustrial Machinery ManufacturingFinancial ServicesMotor Vehicle ManufacturingActor: ZeroSevenGroup, RansomHub, Clop ransomware gang, Qilin ransomware gang2025-11-07T00:00:00
12

Brussels Airport

Critical (100)
🏢6companies impacted
📉34impact score
💥5impact

Brussels Airport experienced a cyberattack on Friday evening that crippled its passenger and baggage check-in systems, forcing manual processing and causing significant operational disruptions. The attack, which also affected other European airports, targeted a third-party service provider’s systems

cyberattack, system disruptionAirlines and Aviation2025-09-20T00:00:00
13

Salesforce

Critical (100)
🏢6companies impacted
📉34impact score
💥5impact

The ransomware group **ShinyHunters (Scattered Lapsus$ Hunters)** breached **Salesforce** by exploiting stolen OAuth tokens from **Salesloft Drift’s AI chatbot integration**, compromising **1.5 billion records** across **760 companies** (including Cisco, Disney, and Marriott). The leaked data includ

Data Breach, Ransomware, Supply Chain Attack, Social EngineeringSoftware DevelopmentActor: Scattered Lapsus$ Hunters (aka ShinyHunters), UNC6040, The Com (English-speaking cybercrime collecti2025-10-03T00:00:00
14

T-Mobile

Critical (100)
🏢6companies impacted
📉34impact score
💥5impact

In August 2021, T-Mobile experienced a significant cybersecurity breach, resulting in the theft of data from about 50 million existing and potential customers. The information compromised included customer addresses, drivers' licenses, and social security numbers. This breach was orchestrated by a 2

Data BreachActor: 21-year-old individual2021-08-01T00:00:00
15
🏢6companies impacted
📉34impact score
💥5impact

**VoidLink Malware Framework Exposes Critical Gaps in Kubernetes and AI Workload Security** In December 2025, Check Point Research disclosed *VoidLink*, a sophisticated Linux malware framework designed to infiltrate cloud-native and AI workloads, marking a shift in how threat actors target modern i

Malware FrameworkComputer Hardware ManufacturingSoftware DevelopmentInformation Technology & ServicesIT Services and IT ConsultingActor: UAT-9921 (APT group)2025-12-01T00:00:00
16
🏢6companies impacted
📉34impact score
💥5impact

**UK Banking Sector Faces Relentless Cyber Threats as IT Failures Disrupt Services** The UK’s financial sector is grappling with escalating cybersecurity risks and frequent IT outages, with bank executives warning of the severe consequences for market stability and public trust. Speaking before the

IT outage, Cyber threatInsuranceBankingRetailFinancial Services2023-01-01T00:00:00
17

Snowflake

Critical (100)
🏢6companies impacted
📉33.8impact score
💥4impact

For much of the summer, Snowflake, a cloud data storage provider, was targeted by a series of data breaches affecting over 165 customers, exposing hundreds of millions of records. These customers included large corporations such as AT&T, Santander, and Live Nation Entertainment. Despite the breach's

Data BreachSoftware Development2024-11-06T00:00:13.988000
18
🏢5companies impacted
📉33.5impact score
💥5impact

A cyber attack on **Collins Aerospace’s Muse software platform**—used for flight check-ins, baggage handling, and boarding coordination—disrupted operations at major European airports, including **Heathrow (UK), Berlin (Germany), and Brussels (Belgium)**. The attack forced airlines to manually proce

Cyber Attack (Software Disruption), Targeted Malware Breach (Potential Ransomware)Aviation and Aerospace Component ManufacturingActor: Suspected Russian Nation-State Hackers, Scattered Spider2025-09-21T00:00:00
19

Kettering Health

Critical (100)
🏢5companies impacted
📉33.5impact score
💥5impact

Kettering Health, a major healthcare provider, fell victim to a **ClickFix attack** linked to the **Interlock ransomware group**, resulting in a significant data breach. The attack exploited social engineering tactics, tricking employees into executing malicious scripts via browser-based lures (e.g.

Social Engineering, Malvertising, SEO Poisoning, Clipboard Hijacking, Fake CAPTCHA, Watering Hole AttackHospitals and Health CareActor: Interlock Ransomware Group, State-Sponsored APTs (Advanced Persistent Threats), Unspecified Cybercri2025-10-20T00:00:00
20

Collins Aerospace

Critical (100)
🏢5companies impacted
📉33.5impact score
💥5impact

Collins Aerospace, a critical supplier in the aerospace and defense industry, fell victim to a **ransomware attack** that disrupted European airports by targeting its digital supply chain dependencies. The incident, highlighted in ENISA’s *Threat Landscape 2025* report, exemplifies how cyber-attacks

Phishing, Vulnerability Exploitation, DDoS, Ransomware, Hacktivism, Malware Deployment, Supply Chain AttackAviation and Aerospace Component ManufacturingActor: NoName057(16), Unspecified State-Sponsored Actors, Financially Motivated Actors2025-06-16T00:00:00
21

Oracle

Critical (100)
🏢5companies impacted
📉33.5impact score
💥5impact

The **Clop ransomware gang** exploited a **critical zero-day vulnerability (CVE-2025-61882)** in **Oracle E-Business Suite (EBS)**, specifically within the **BI Publisher Integration component**, to conduct **data theft attacks** since at least **August 2025**. The flaw allowed **unauthenticated rem

Data Theft, Ransomware Extortion, Zero-Day ExploitationIT Services and IT ConsultingActor: Clop Ransomware Gang, GRACEFUL SPIDER (moderate confidence)2025-08-01T00:00:00
22

Oracle

Critical (100)
🏢5companies impacted
📉33.5impact score
💥5impact

The **Clop ransomware gang** exploited a **zero-day vulnerability** in **Oracle’s E-Business Suite**, a critical enterprise software used for managing customer data, HR files, and corporate operations. The attack, active since at least **July 10**, allowed hackers to steal **significant amounts of s

Data Breach, Extortion, Zero-Day ExploitIT Services and IT ConsultingActor: Clop Ransomware/Extortion Gang2025-07-10T00:00:00
23
🏢5companies impacted
📉33.5impact score
💥5impact

**Russian National Linked to Conti and TrickBot Ransomware Operations Identified in Global Crackdown** Germany’s Federal Criminal Police Office (BKA) has accused Russian national **Vitaly Nikolaevich Kovalev**—also known by the alias **Stern**—of leading the **Conti and TrickBot (Wizard Spider) ran

RansomwareBlockchain ServicesComputer and Network SecurityMotor Vehicle ManufacturingActor: Vitaly Nikolaevich Kovalev (Stern), Wizard Spider (TrickBot Group)2025-06-02T00:00:00
24
🏢5companies impacted
📉33.5impact score
💥5impact

**Ransomware Attacks Hit Record Highs in 2025 Despite Major Disruptions** A new study by Symantec and the Carbon Black Threat Hunter Team reveals that ransomware attacks surged to unprecedented levels in 2025, with threat actors adapting rapidly to law enforcement crackdowns and evolving their exto

ransomware, extortionSoftware DevelopmentFinancial ServicesComputer and Network SecurityPublic SafetyInformation Technology & ServicesActor: RansomHub, LockBit (Syrphid), Akira, Qilin, Inc, Safepay, DragonForce, Snakefly (Cl0p), ShinyHunters2024-06-16T00:00:00
25
🏢5companies impacted
📉33.5impact score
💥5impact

**Ransomware and Supply Chain Attacks Hit Record Highs in 2025, Signaling Escalating Threats** 2025 marked a sharp escalation in cyber threats, with ransomware and supply chain attacks reaching unprecedented levels, according to a new report from threat intelligence firm Cyble. The year saw **6,604

ransomware, supply chain attackComputer and Network SecuritySoftware DevelopmentRecreational FacilitiesActor: Qilin, Akira, CL0P, Play, Sinobi, Devman, Warlock, Gunra, Dragonforce, MedusaLocker, Chaos, Makop2024-06-16T00:00:00
26
🏢5companies impacted
📉33.5impact score
💥5impact

**AI-Powered Hacker Exploits Anthropic’s Claude to Breach Mexican Government Agencies** An unknown threat actor leveraged Anthropic’s AI chatbot, Claude, to orchestrate a large-scale cyberattack against multiple Mexican government agencies, stealing 150 gigabytes of sensitive data, including taxpay

Data Breach, Cyberattack, AI-Enabled AttackGovernment AdministrationActor: Unknown (potentially state-sponsored or cybercriminal)2025-12-01T00:00:00
27
🏢5companies impacted
📉33.5impact score
💥5impact

**China-Backed Storm-2603 Deploys Warlock Ransomware in Widespread SharePoint Attacks** On July 23, Microsoft reported that the China-linked threat group **Storm-2603** exploited on-premises **SharePoint servers** using **Warlock ransomware**, a ransomware-as-a-service (RaaS) operation that emerged

Ransomware AttackSoftware DevelopmentDefense and Space ManufacturingManufacturingActor: Storm-2603 (China-linked)2025-07-24T00:00:00
28
🏢5companies impacted
📉33.5impact score
💥5impact

**GitHub, npm, and VS Code Repositories Compromised by Glassworm’s Invisible Unicode Attack** Researchers at Aikido Security uncovered a sophisticated campaign by the threat actor **Glassworm**, which compromised at least **151 GitHub repositories** between **March 3 and March 9** by embedding mali

Supply Chain AttackIT Services and IT ConsultingComputer and Network SecuritySoftware DevelopmentActor: Glassworm2026-03-14T00:00:00
29
🏢5companies impacted
📉33.5impact score
💥5impact

**AWS Bedrock AI Platform Exposed to Eight Critical Attack Vectors, Research Reveals** Amazon’s AWS Bedrock a platform enabling developers to build AI-powered applications by integrating foundation models with enterprise data and systems has been identified as a high-value target for attackers. Sec

Misconfiguration, Privilege Escalation, Data Exfiltration, AI SecurityTechnology, Information and InternetSoftware DevelopmentIT Services and IT Consulting2026-03-23T00:00:00
30
🏢5companies impacted
📉33.5impact score
💥5impact

**Cisco Hit by Major Cyberattack Linked to Supply Chain Breach** Cisco is responding to a significant cybersecurity incident after threat actors breached its internal development networks, stealing sensitive source code and corporate data. The attack, claimed by the hacking group **ShinyHunters**,

Supply Chain Attack, Data BreachSoftware DevelopmentComputer and Network SecurityIT Services and IT ConsultingActor: ShinyHunters, TeamPCP2026-04-01T00:00:00
31
🏢5companies impacted
📉33.5impact score
💥5impact

**March 2026 Ransomware Surge: Critical Infrastructure Under Fire** March 2026 marked a sharp escalation in ransomware activity, with **780 attacks** recorded a **13% increase** from February and the second-highest monthly total since February 2025. The surge was driven by targeted campaigns agains

RansomwareOil and GasEnvironmental ServicesTelecommunicationsChemical ManufacturingUtilitiesActor: Qilin, Akira, The Gentlemen, AiLock, NetRunnerPR2026-03-01T00:00:00
32
🏢5companies impacted
📉33.5impact score
💥5impact

**ShinyHunters Breaches Anodot, Compromises Snowflake Customer Data in Supply Chain Attack** The ShinyHunters extortion group has claimed responsibility for a supply chain attack on Anodot, an AI-driven cloud analytics platform, resulting in the theft of authentication tokens for over a dozen Snowf

Supply Chain AttackBusiness Intelligence PlatformsActor: ShinyHunters2026-04-08T00:00:00
33
🏢4companies impacted
📉33.4impact score
💥7impact

**Critical Telnetd Vulnerability (CVE-2026-32746) Exposes Legacy Systems to Remote Code Execution** A severe buffer overflow vulnerability (CVE-2026-32746) has been identified in the GNU InetUtils *telnetd* daemon, allowing unauthenticated attackers to execute arbitrary code with root privileges. T

Vulnerability ExploitationSoftware Development2026-03-18T00:00:00
34
🏢4companies impacted
📉33.4impact score
💥7impact

**Iran-Linked Handala Claims Cyberattacks on Three Major UAE Organizations** On April 13, 2026, the Iran-aligned hacking group **Handala** announced a series of cyberattacks targeting three key UAE institutions: **Dubai Courts, Dubai Land Department, and Dubai Roads & Transport Authority**. The gro

Data Destruction, Data Theft, ExtortionReal EstateMedical Equipment ManufacturingComputer and Network SecurityAdministration of JusticeActor: Handala (Iran-aligned, believed to be a front for Void Manticore)2016-07-19T00:00:00
35
🏢5companies impacted
📉33.3impact score
💥4impact

**Everest Ransomware Group Claims Massive Data Breach at McDonald’s India** The Everest ransomware group has alleged a major cyberattack on McDonald’s India, claiming to have exfiltrated **861 GB of sensitive data**, including internal documents and customer personal information. The threat actors

RansomwareComputer Hardware ManufacturingMotor Vehicle ManufacturingFood and Beverage ServicesRestaurantsActor: Everest Ransomware Group2017-06-16T00:00:00
36
🏢5companies impacted
📉33.3impact score
💥4impact

**Global Ransomware Attacks Surge 32% in 2025, With Manufacturing and U.S. Organizations Hit Hardest** In 2025, global ransomware attacks reached **7,419 incidents**, marking a **32% increase** from the 5,631 recorded in 2024, according to a report by **Comparitech**. Of these, **1,173 attacks were

RansomwareHospitals and Health CareFood and Beverage ServicesBusiness Consulting and ServicesManufacturingIT Services and IT ConsultingActor: Qilin, Akira, SafePay, Clop, Interlock, DragonForce2026-01-15T00:00:00
37
🏢4companies impacted
📉33.2impact score
💥6impact

**DHS Warns of Escalating Cyber Threats from Iran-Backed Hackers Amid Rising Tensions** The U.S. Department of Homeland Security (DHS) issued a **National Terrorism Advisory System (NTAS) bulletin** on Sunday, warning of heightened cyberattack risks from **Iran-backed hacking groups and pro-Iranian

Cyberattack, Initial Access Brokerage, RansomwareLaw EnforcementGovernment AdministrationArmed ForcesActor: Iran-backed hacking groups, Pro-Iranian hacktivists, Br0k3r (Pioneer Kitten, Fox Kitten, UNC757, Par2026-01-05T00:00:00
38
🏢4companies impacted
📉33.2impact score
💥6impact

**Russian Dairy Supply Chain Disrupted by Cyberattack on Mercury Certification Platform** Major Russian retailers, including Lenta, Miratorg, and Yandex Lavka, have reported significant disruptions to their dairy supply chains following a cyberattack last week on the Mercury platform. The system, m

CyberattackRetailTelecommunicationsFood and Beverage Manufacturing2025-06-23T00:00:00
39
🏢4companies impacted
📉33.2impact score
💥6impact

**Singapore’s Major Telcos Targeted by State-Linked Cyberespionage Group UNC3886** On February 9, Singapore’s Minister for Digital Development and Information, Josephine Teo, disclosed that all four of the country’s major telecommunications providers Singtel, StarHub, M1, and Simba Telecom were tar

CyberespionageTelecommunicationsActor: UNC38862026-02-09T00:00:00
40
🏢4companies impacted
📉33.2impact score
💥6impact

**Exposed ICS/OT Devices Under Nation-State Threat: Key Findings from Team Cymru’s Research** Team Cymru’s latest research reveals alarming vulnerabilities in industrial control systems (ICS) and operational technology (OT) environments, highlighting how exposed devices remain prime targets for hos

Cyber Espionage, Sabotage, Remote Code ExecutionAutomation Machinery ManufacturingSoftware DevelopmentIT Services and IT ConsultingRenewable Energy Power GenerationActor: Dragonfly, Nation-State Actor (Suspected Russian)2025-12-29T00:00:00
41
🏢4companies impacted
📉33.2impact score
💥6impact

**Cyberattacks on Critical Infrastructure Disproportionately Impact Women, Yet Policy Remains Gender-Blind** Cyberattacks on essential services healthcare, education, and transportation are increasing in frequency and severity, with consequences that extend far beyond technical disruptions. While t

ransomware, cyberattackResearch ServicesTransportation/Trucking/RailroadIT Services and IT ConsultingGovernment Administration2024-02-21T00:00:00
42
🏢4companies impacted
📉33.2impact score
💥6impact

**BePrime Cyberattack Exposes 12.6GB of Data, Highlights Critical Security Failures** A Mexico-based cybersecurity firm, BePrime, suffered a major breach after attackers allegedly exploited unprotected administrator accounts lacking multifactor authentication (MFA). The incident, disclosed by the t

Data BreachMiningElectric Power GenerationInformation Technology & ServicesRestaurants2026-04-20T00:00:00
43
🏢3companies impacted
📉33.1impact score
💥8impact

**Confucius APT Expands Cyber Espionage Campaigns Against Pakistan with New Malware Tools** The threat group **Confucius**, active since at least **2013**, has launched a renewed phishing campaign targeting **Pakistan**, deploying advanced malware families including **WooperStealer** and the Python

Cyber EspionageAviation and Aerospace Component ManufacturingFinancial ServicesHuman ResourcesActor: Confucius APT2024-12-01T00:00:00
44
🏢3companies impacted
📉33.1impact score
💥8impact

**FancyBear’s OPSEC Blunder Exposes Russian Espionage Operations Targeting NATO-Aligned Governments** A critical operational security (OPSEC) failure by the Russian state-backed threat group **APT28 (FancyBear)** has exposed a live command-and-control (C2) server containing stolen credentials, two-

Cyber EspionageArmed ForcesIT Services and IT ConsultingDefense and Space ManufacturingActor: APT28 (FancyBear)2026-03-18T00:00:00
45

Salesforce

Critical (100)
🏢4companies impacted
📉33impact score
💥5impact

The **ShinyHunters** extortion group exploited compromised **Drift OAuth tokens** linked to **Salesloft** to steal over **1.5 billion Salesforce records** from **760 companies**. Attackers used **social engineering and malicious OAuth apps** to infiltrate Salesforce environments, exfiltrating massiv

Data Breach, Extortion, Unauthorized Access, Credential TheftSoftware DevelopmentActor: ShinyHunters, Scattered Spider, Lapsus$, UNC6040 (Google Mandiant), UNC6395 (Google Mandiant), Scatt2025-09-18T00:00:00
46

Salesloft

Critical (100)
🏢4companies impacted
📉33impact score
💥5impact

The attack on **Salesloft** began with the compromise of an internal **GitHub repository**, where attackers stole a high-privilege **OAuth token** granting access to its **Drift cloud application**. Exploiting Drift’s trusted integrations, the attackers pivoted to **Salesforce instances** of multipl

Supply Chain Attack, Data Breach, Unauthorized Access, AI Integration ExploitationSoftware Development2025-09-25T00:00:00
47
🏢4companies impacted
📉33impact score
💥5impact

A ransomware group, **J Group**, claimed a major breach of **Dimensional Control Systems (DCS)**, a Michigan-based provider of dimensional engineering software critical to manufacturing giants like **Boeing, Samsung, Volkswagen, and Airbus**. The attackers allegedly exfiltrated **11GB of sensitive d

ransomware, data breach, supply chain attackMechanical Or Industrial EngineeringActor: J Group2025-10-04T00:00:00
48

F5

Critical (100)
🏢4companies impacted
📉33impact score
💥5impact

US tech company **F5** confirmed a **data breach** in which **nation-state attackers** stole the **source code** and **vulnerability information** related to its **BIG-IP family of networking and security products**. BIG-IP is a critical infrastructure component used by enterprises for traffic manag

Vulnerability, Zero-Day Exploits, Data Breach, Vulnerability, Malware Distribution (Ransomware), Zero-Day Exploit (Rootkit), Cryptocurrency Fraud, Hardware Vulnerability (Espionage), Cyberattack Campaign (Healthcare)IT Services and IT ConsultingActor: None, None, Nation-State Attackers, None, Vanilla Tempest (Ransomware Group), None, Cryptocurrency F2025-10-19T00:00:00
49

Hitachi Vantara

Critical (100)
🏢4companies impacted
📉33impact score
💥5impact

Hitachi Vantara, a subsidiary of Hitachi, suffered a disruptive **Akira ransomware attack** on **April 26, 2025**, forcing the company to take critical servers offline to contain the breach. The incident disrupted internal systems, manufacturing operations, and remote/support services, though cloud

Ransomware AttackIT Services and IT ConsultingActor: Akira Ransomware Group2025-04-26T00:00:00
50
🏢4companies impacted
📉33impact score
💥5impact

The second Shai-Hulud attack last week exposed around 400,000 raw secrets after infecting hundreds of packages in the NPM (Node Package Manager) registry and publishing stolen data in 30,000 GitHub repositories. Although just about 10,000 of the exposed secrets were verified as valid by the open-so

Supply Chain AttackSoftware DevelopmentActor: Shai-Hulud2025-12-01T00:00:00
Page 1 of 345 (17214 incidents)