[August-25-2025] Daily Cybersecurity Threat Report

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.


  1. Alleged leak of Russian job seeker records

  1. Z-ALLIANCE targets the website of Agrohills Nut

  1. Alleged unauthorized access to municipal wastewater treatment plant in Czech Republic

  1. Alleged sale of a Cryptocurrency Checker

  1. TEAM BD CYBER NINJA targets the website of ETS Tech

  1. Alleged sale of Spain databases

  1. Alleged data leak of Islamic Revolutionary Guard Corps

  1. Red wolf cyber targets the UK and Indian cyber forces

  1. Alleged data breach of Exel Composites

  1. Alleged leak of unauthorized access to an unidentified cafe in Ukraine

  1. Alleged data leak of unidentified bank in Thailand

  1. Alleged sale of Horus Eyes RAT

  1. Alleged data breach of Zhytomyr Ivan Franko State University

  1. Infrastructure Destruction Squad claims to target Zhytomyr Ivan Franko State University

  1. Alleged data leak of unidentified hospital in France

  1. Alleged sale of forex database

  1. Alleged Data Breach of SpiffyBin

  1. Alleged leak of login access to RMS platform of Pathum Thani Technical College

  1. Alleged data leak of unidentified hospital in France

Conclusion The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches and leaks are prominent, affecting various sectors from education, and food & beverages to military and healthcare, and impacting countries including Russia, Ukraine, Czech Republic, Vietnam, Spain, Iran, Finland, Thailand, USA, and France. The compromised data ranges from personal user information, financial details and credit card details to sensitive patient records, classified military components, and large customer databases.

Beyond data compromise, the report also reveals significant activity in initial access sales, with threat actors offering unauthorized access to municipal wastewater treatment plants, corporate networks (including a cafe and a college in Ukraine and Thailand), and even military infrastructure like the Islamic Revolutionary Guard Corps. The sale of malware, including penetration testing tools and DDoS tools, further underscores the availability of offensive capabilities in the cyber underground.

The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.