Rankiteo Blog
  • Blog Home Page
  • Website Home Page
  • About
Sign in Sign up
Sign up Sign in
  • Blog Home Page
  • Website Home Page
  • About
  • Data & privacy
  • Contact
Unlock full access to see the entire library by subscribing to a paid plan.
Sign up
Bookmarks

Cyber Attack

2752 posts
European Union Organizations: Cyber Security News ®’s Post
cyber Cyber Attack

European Union Organizations: Cyber Security News ®’s Post

public – 1 min read
APT28 Exploits Microsoft Office Zero-Day in Targeted Cyberattacks A Russia-linked threat group, UAC-0001 (APT28), has been actively exploiting a critical…
Jan 26, 2026
Jeremy C Jeremy C
macOS users: Beware of New Compliance Emails Weaponizing Word/PDF Files to Steal Sensitive Data
cyber Cyber Attack

macOS users: Beware of New Compliance Emails Weaponizing Word/PDF Files to Steal Sensitive Data

public – 2 min read
Sophisticated macOS Phishing Campaign Targets Users with Fake Compliance Emails A new phishing campaign is targeting macOS users with a…
Jan 25, 2026
Jeremy C Jeremy C
Microsoft: Malicious AI extensions on VSCode Marketplace steal developer data
cyber Cyber Attack

Microsoft: Malicious AI extensions on VSCode Marketplace steal developer data

public – 3 min read
Malicious VSCode Extensions Exfiltrate Developer Data to China-Based Servers Two AI-powered extensions in Microsoft’s Visual Studio Code (VSCode) Marketplace,…
Jan 24, 2026
Jeremy C Jeremy C
Okta, Salesforce and Google: ShinyHunters claim to be behind SSO-account data theft attacks
cyber Cyber Attack

Okta, Salesforce and Google: ShinyHunters claim to be behind SSO-account data theft attacks

public – 3 min read
ShinyHunters Gang Behind Vishing Attacks Targeting SSO Accounts at Okta, Microsoft, and Google The extortion group ShinyHunters has claimed responsibility…
Jan 23, 2026
Jeremy C Jeremy C
Statista and Identity Theft Resource Center: Entities affected by supply chain cyberattacks U.S. 2025
cyber Cyber Attack

Statista and Identity Theft Resource Center: Entities affected by supply chain cyberattacks U.S. 2025

public – 2 min read
Supply Chain Cyberattacks in the U.S. Surge from 2021 to 2025, New Data Reveals A recent report from the…
Jan 23, 2026
Jeremy C Jeremy C
Greenvelope and LogMeIn: Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
cyber Cyber Attack

Greenvelope and LogMeIn: Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access

public – 2 min read
Cyberattackers Exploit Stolen Credentials and Legitimate RMM Tools for Persistent Access Cybersecurity researchers at KnowBe4 Threat Labs have uncovered a…
Jan 23, 2026
Jeremy C Jeremy C
Okta, Hinge, Match Group, Match.com and OkCupid: Match Group breach exposes data from Hinge, Tinder, OkCupid, and Match
cyber Cyber Attack

Okta, Hinge, Match Group, Match.com and OkCupid: Match Group breach exposes data from Hinge, Tinder, OkCupid, and Match

public – 3 min read
Match Group Confirms Data Breach After ShinyHunters Leaks 10 Million User Records Match Group, the parent company behind popular dating…
Jan 22, 2026
Jeremy C Jeremy C
npm: G_Wagon NPM Package Exploits Users to Steal Browser Credentials with Obfuscated Payload
cyber Cyber Attack

npm: G_Wagon NPM Package Exploits Users to Steal Browser Credentials with Obfuscated Payload

public – 3 min read
Sophisticated npm Infostealer "G_Wagon" Targets Developers with Fake UI Library A highly advanced infostealer malware, dubbed G_…
Jan 21, 2026
Jeremy C Jeremy C
Tinder, Capcom, ElevenLabs and Zendesk: Mass Spam Attacks Leverage Zendesk Instances
cyber Cyber Attack

Tinder, Capcom, ElevenLabs and Zendesk: Mass Spam Attacks Leverage Zendesk Instances

public – 3 min read
Zendesk Instances Exploited in Widespread Spam Campaign A surge of spam emails originating from legitimate Zendesk domains has raised concerns…
Jan 20, 2026
Jeremy C Jeremy C
Fortinet: Hackers Leveraged CyberStrikeAI Tool to Breach Fortinet FortiGate Devices
cyber Cyber Attack

Fortinet: Hackers Leveraged CyberStrikeAI Tool to Breach Fortinet FortiGate Devices

public – 2 min read
AI-Powered CyberStrikeAI Tool Emerges as a Growing Threat to Fortinet FortiGate Devices A new offensive security tool, CyberStrikeAI, is being…
Jan 20, 2026
Jeremy C Jeremy C
eScan and MicroWorld Technologies: eScan Antivirus Supply Chain Breach Delivers Signed Malware
cyber Cyber Attack

eScan and MicroWorld Technologies: eScan Antivirus Supply Chain Breach Delivers Signed Malware

public – 2 min read
Critical eScan Antivirus Supply Chain Attack Distributes Multi-Stage Malware Globally On January 20, 2026, a supply chain compromise targeting MicroWorld…
Jan 20, 2026
Jeremy C Jeremy C
Touch ‘n Go: Researchers Hijack Hacker Domain Using Name Server Delegation
cyber Cyber Attack

Touch ‘n Go: Researchers Hijack Hacker Domain Using Name Server Delegation

public – 2 min read
Infoblox Researchers Expose Massive Push Notification Scam via DNS Misconfiguration Security researchers at Infoblox uncovered a large-scale malicious push notification…
Jan 19, 2026
Jeremy C Jeremy C
Ready to get started now?
Subscribe to get access to premium content or contact us if you have any questions.
Subscribe Contact us
Rankiteo Blog
Every risk at your fingertips
Navigation
  • Blog Home Page
  • Website Home Page
  • About
Quick links
  • Data & privacy
  • Contact
Tags
cyber Breach Ransomware Cyber Attack Vulnerability
©2026 Rankiteo Blog. Published with Ghost & Dashi.
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.