[March-2-2026] Daily Cybersecurity Threat Report

1. Executive Summary

This report details a series of recent cyber incidents, providing key information for each event strictly based on the provided data. The dataset reveals a highly active global cyber threat landscape characterized by politically motivated hacktivism, opportunistic defacements, the sale of initial access to corporate networks, and large-scale data breaches. The targeting is geographically diverse, though concentrated clusters of activity are visible in the Middle East (Israel, UAE) and Asia (India).

2. Threat Landscape by Attack Category

The incidents analyzed fall into four primary categories: Defacement, Data Breach, Initial Access, and Alerts.

Data Breaches

Data breaches account for a significant portion of the reported incidents, ranging from small organizational leaks to massive national datasets.

  • High-Volume Consumer Data: A major leak involved approximately 7 million records allegedly belonging to Experian Ltd in the UK, containing names, dates of birth, contact details, and financial data. Another significant claim involves 4.69 million Israeli citizens’ personal data.
  • Aviation Sector: The threat actor Everestgroup claimed to have leaked massive datasets from Atlas Air (1.2 terabytes) and Tsunami Tsolutions (562 GB).
  • Healthcare and Social Services: Sensitive medical records were allegedly leaked from a Paris Hospital database by the actor “epi”. Furthermore, data from the French STEM education initiative C Génial was breached by the FAD Team.
  • Corporate & Tech: An actor claimed to sell a database of 12,000 Italy-based forex and cryptocurrency depositor leads. Additionally, the AI product Komiko suffered a breach where an attacker alleged exfiltration of user IDs and email addresses, though passwords were not exposed.

Website Defacements

Defacements represent the highest volume of individual incidents in the dataset, primarily driven by a few highly active threat actor groups.

  • Mass Campaigns: Actors like BABAYO EROR SYSTEM, Nicotine, and Hax.or engage in rapid, low-sophistication website takeovers. Nicotine, for example, heavily targeted small-to-medium businesses in the UAE, such as Coco N Curry and Sweet Home Spa.
  • Educational Targeting: Educational institutions were frequent targets for defacement. BABAYO EROR SYSTEM defaced websites belonging to William & Mary , Auburn University , and Universitas Gadjah Mada.

Initial Access Brokers & Critical Infrastructure

The sale or claiming of initial access poses severe operational risks, particularly when involving critical infrastructure.

  • Water Treatment Facilities: The Infrastructure Destruction Squad claimed unauthorized access to the Delhi Water Supply and Sewerage Board, specifically the Coronation Water Treatment Plant. They also claimed access to the Joda ULB water treatment plant control system.
  • SCADA/ICS Systems: The IT ARMY OF RUSSIA claimed unauthorized access to industrial greenhouse climate control systems in Kyiv, Ukraine, allegedly manipulating temperature controls. Cyber Islamic resistance claimed to have compromised over 130 remote control systems of Control Applications Ltd across multiple countries.
  • Commercial Access Brokers: Actors frequently posted on forums selling access to various entities, such as a WordPress pet supply shop in Chile and administrative access to a PrestaShop in the USA enabling payment redirection.

Threat Alerts

Several groups issued forward-looking threats and alerts indicating planned campaigns.

  • Geopolitical Threats: The FAD Team indicated they are targeting the USA as well as Qatar, Saudi Arabia, Bahrain, Jordan, Kuwait, and the UAE. The Russian Legion claimed to have gained access to the Iron Dome of Israel.

3. Key Threat Actor Profiles

The table below highlights the most prolific and impactful threat actors identified in the dataset.

Threat ActorPrimary CategoryTarget GeographiesKey Activities / Targets
BABAYO EROR SYSTEMDefacementIndia, USA, Philippines, Indonesia Highly active in defacing educational and government portals, alongside various private businesses.
NicotineDefacementUAE Exclusively targeted UAE-based businesses across retail, hospitality, and automotive sectors.
Hax.orDefacementUAE, Qatar Heavily targeted real estate, engineering, and service companies in the UAE.
FAD TeamData Breach, Defacement, AlertFrance, India, Vietnam, USA, Middle East Claimed data breaches of educational institutions and issued broad geopolitical threats.
Infrastructure Destruction SquadInitial AccessIndia Focused on gaining control over critical water treatment facilities and industrial control networks.
Cyber Islamic resistanceInitial Access, AlertIsrael, Jordan Claimed access to IoT camera infrastructure and widespread industrial control systems.
EverestgroupData BreachUSA Responsible for massive alleged data leaks in the aviation sector, targeting Atlas Air and Tsunami Tsolutions.

4. Geographic Victimology

The dataset highlights specific regional targeting trends based on actor motivations.

  • Israel: Israel is the most frequently targeted nation in this dataset, primarily facing politically motivated attacks. The Cyber Isnaad Front claimed to disrupt military and government communication infrastructure. Other actors leaked data from Israeli Facebook users , citizens’ passports , and breached corporate entities like Hermon Laboratories.
  • United Arab Emirates (UAE): The UAE experienced a massive volume of website defacements. Actors like Nicotine, Hax.or, and Rayzky_ targeted dozens of private enterprises, ranging from digital media companies to local cafes.
  • India: India faced a mix of nuisance defacements and severe critical infrastructure threats. While BABAYO EROR SYSTEM defaced numerous commercial websites , the Infrastructure Destruction Squad claimed access to vital water management systems in Delhi and Odisha.
  • United States: U.S. organizations suffered from high-impact data breaches and the sale of initial access. Actors sold access to U.S. corporate cloud buckets , leaked large banking lead databases , and compromised massive datasets from aviation companies.
  • France: France was a frequent target for data breaches. The actor “epi” leaked data from the secure messaging platform Tchap , Bioserveur , and a Paris hospital.

5. Conclusion

The threat intelligence derived from this dataset illustrates a bifurcated threat landscape. On one end, there is a high volume of low-sophistication “noise” generated by defacement groups like Nicotine and BABAYO EROR SYSTEM, who seek visibility and disruption. On the other end, there are highly critical, targeted attacks threatening operational technology (SCADA/ICS) , essential utilities (water treatment) , and resulting in the exfiltration of terabytes of sensitive corporate and consumer data. Organizations must prioritize securing Internet-facing industrial controls, locking down cloud storage buckets, and preparing for the persistent threat of hacktivism tied to geopolitical conflicts.

Detected Incidents Draft Data

  1. Alleged unauthorized access to Delhi Water Supply and Sewerage Board system
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to system of the Delhi Water Supply and Sewerage Board. which is affiliated with the Indian government, and gained full control over the Coronation Water Treatment Plant
    Date: 2026-03-02T23:59:55Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3857
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d2a97f2e-2b8f-4925-8c74-09ef2073aae5.png
    https://d34iuop8pidsy8.cloudfront.net/8ae4b448-523c-4454-9cc2-abe5dbc4ddb5.png
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  2. alleged unauthorized access to government and military communication infrastructure of Israel
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to government and military communication infrastructure of Israel. which contain more than 160 data centers that manage internal networks in various cities of the occupied territories. It disrupted all military, government, and private communications and destroyed all their data and documents.
    Date: 2026-03-02T23:27:58Z
    Network: telegram
    Published URL: https://t.me/CyberIsnaadFront2/560?single
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d121276b-9180-4873-a990-8885560fdc78.png
    https://d34iuop8pidsy8.cloudfront.net/8eb1c138-9903-46a2-bf67-32bba44c28fa.png
    https://d34iuop8pidsy8.cloudfront.net/2f07e01d-7f59-460c-b2a3-efeb794f6ccb.png
    Threat Actors: Cyber Isnaad Front
    Victim Country: Israel
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  3. BABAYO EROR SYSTEM targets the website of Natural Hair Replacement Centre
    Category: Defacement
    Content: The group claims to have defaced the website of Natural Hair Replacement Centre
    Date: 2026-03-02T23:26:41Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/218
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3b322c50-9b75-4a4b-b6ad-1a64fc4ca38c.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: India
    Victim Industry: Cosmetics
    Victim Organization: natural hair replacement centre
    Victim Site: naturalhrc.com
  4. BABAYO EROR SYSTEM targets the website of Ram Publicity
    Category: Defacement
    Content: The group claims to have defaced the website of Ram Publicity
    Date: 2026-03-02T23:23:44Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/218
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0712624a-0fdf-4f97-bc5b-0c3ecf848e2a.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: India
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: ram publicity
    Victim Site: rampublicity.com
  5. BABAYO EROR SYSTEM targets the website of Enchanting Kashmir Tours
    Category: Defacement
    Content: The group claims to have defaced the website of Enchanting Kashmir Tours
    Date: 2026-03-02T23:22:45Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/218
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4a67acc9-bc19-43e7-8393-240ee9975451.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: India
    Victim Industry: Hospitality & Tourism
    Victim Organization: enchanting kashmir tours
    Victim Site: enchantingkashmirtours.com
  6. BABAYO EROR SYSTEM targets the website of Core technologies
    Category: Defacement
    Content: The group claims to have defaced the website of Core technologies
    Date: 2026-03-02T23:17:26Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/218
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/38c1eed7-dfcd-4b66-a358-d9fef10ecc37.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: India
    Victim Industry: Wholesale
    Victim Organization: core technologies
    Victim Site: coretechnologies.in
  7. BABAYO EROR SYSTEM targets the website of DK CHM Print Solution
    Category: Defacement
    Content: The group claims to have defaced the website of DK CHM Print Solution
    Date: 2026-03-02T23:13:52Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/218
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4ea271ff-e665-4cc6-bfca-3acdb0a00827.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: India
    Victim Industry: Printing
    Victim Organization: dk chm print solution
    Victim Site: dkchmprintsolution.in
  8. Alleged breach of Sharjah National Oil Corporation (SNOC)
    Category: Data Breach
    Content: The group claims to have breached 1.3 TB of the Sharjah National Oil Corporation (SNOC) database. The compromised data allegedly contains financial records, contracts, and internal documents, along with statements alleging disruption of critical infrastructure.
    Date: 2026-03-02T23:08:56Z
    Network: openweb
    Published URL: https://x.com/HANDALA_RSS/status/2028571378933248241
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/94b4913a-807b-4dc5-a60f-83d4b0c65854.png
    Threat Actors: Handala
    Victim Country: UAE
    Victim Industry: Oil & Gas
    Victim Organization: sharjah national oil corporation (snoc)
    Victim Site: snoc.ae
  9. BABAYO EROR SYSTEM targets the website of Gujarat Book of Records
    Category: Defacement
    Content: The group claims to have defaced the website of Gujarat Book of Records
    Date: 2026-03-02T23:05:59Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/218
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/04e69859-a81e-4e4e-a7ba-7e21c68badb0.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: gujarat book of records
    Victim Site: gujaratbookofrecords.org
  10. Alleged Leak of Business Accounts Data in multiple countries
    Category: Data Breach
    Content: Threat actor claims to be selling verified personal and business bank accounts across the UK, USA, and EU regions. The listing includes accounts from various financial institutions, payment platforms, and crypto exchanges, with claims of included email access, phone number access, ID documents, and business verification documents.
    Date: 2026-03-02T22:58:40Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277408/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d79c2251-6b03-40a7-9a5d-ddd1b9f718c1.png
    https://d34iuop8pidsy8.cloudfront.net/4b4badc1-1159-40d9-b2e6-e28112255191.png
    https://d34iuop8pidsy8.cloudfront.net/6f5eecc2-a5a9-4d0e-920f-8401a4823593.png
    Threat Actors: VIRTUALBANKSERVI
    Victim Country: UK
    Victim Industry: Banking & Mortgage
    Victim Organization: Unknown
    Victim Site: Unknown
  11. Alleged Sale of Unauthorized Access to a WordPress Pet Supply Shop in Chile
    Category: Initial Access
    Content: Threat Actor claims to be selling unauthorized access to a wordpress pet supply shop in Chile. The store processes payments via Mercado Pago and supports card transactions.
    Date: 2026-03-02T22:10:32Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277405/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c7c003b7-f1ac-451b-b005-2e0e5ba3b84c.png
    Threat Actors: Emperorcvv
    Victim Country: Chile
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  12. Alleged Data Leak of 12K Italy Forex & Crypto Depositors Leads
    Category: Data Breach
    Content: A threat actor is advertising the alleged sale of a database containing approximately 12,000 Italy-based forex and cryptocurrency depositor leads. The dataset is claimed to include personal and financial-related lead information such as names, email addresses, phone numbers, broker details, deposit status, and other marketing-related fields.
    Date: 2026-03-02T21:44:37Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-12K-Italy-Country-Forex-Crypto-Depositors-Leads
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/20a5c119-2f97-4863-ba85-c6aab9b9ab4f.png
    Threat Actors: kaareds
    Victim Country: Italy
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  13. Alleged unauthorized FTP access to Kan
    Category: Initial Access
    Content: Group claims to be leaked unauthorized FTP access to Kan
    Date: 2026-03-02T21:42:22Z
    Network: telegram
    Published URL: https://t.me/crewcyber/864
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/20bafa33-cba9-477d-976e-aa39e4e62b21.jpg
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: Israel
    Victim Industry: Broadcast Media
    Victim Organization: kan
    Victim Site: kan.org.il
  14. BABAYO EROR SYSTEM targets the website of Atma Jaya Catholic University of Indonesia
    Category: Defacement
    Content: The group claims to have defaced the website of Atma Jaya Catholic University of Indonesia.
    Date: 2026-03-02T21:37:54Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/207
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e962e793-9779-46ca-a129-4fca95b6a349.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Higher Education/Acadamia
    Victim Organization: atma jaya catholic university of indonesia
    Victim Site: atmajaya.ac.id
  15. BABAYO EROR SYSTEM targets the website of City Government of Tagaytay
    Category: Defacement
    Content: The group claims to have defaced the website of City Government of Tagaytay
    Date: 2026-03-02T21:27:36Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/207
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1795c21b-d803-47a0-ba32-75d9fd8de1e1.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Philippines
    Victim Industry: Government & Public Sector
    Victim Organization: city government of tagaytay
    Victim Site: tagaytay.gov.ph
  16. Alleged data breach of Sadenet
    Category: Data Breach
    Content: A threat actor claims to have leaked data belonging to Sadenet, a Turkish internet service provider. the database allegedly contains 169,213 records.The leaked dataset is said to contain sensitive personal information, including Turkish TC ID numbers, TC serial numbers, full names, residential addresses, phone numbers, email addresses, gender details, birthplace information, and various internal system-related fields.
    Date: 2026-03-02T21:15:08Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-TR-Sadenet-ISP-160K-Records-TC-Serials
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/99ffcdcf-abbf-4589-9a11-9fe264ec7e49.png
    Threat Actors: Raperdogan
    Victim Country: Turkey
    Victim Industry: Network & Telecommunications
    Victim Organization: sadenet
    Victim Site: sadenet.com.tr
  17. Alleged Data leak of Amos Spacecom
    Category: Data Breach
    Content: The group claims to have leaked the employee data from Israelis satellite operator Spacecom, which includes employee records, non-disclosure agreements.
    Date: 2026-03-02T21:01:29Z
    Network: telegram
    Published URL: https://t.me/anonymous_algeria_Original/3289
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/bf6117e9-ada9-47ce-bf42-784e42d103f0.png
    Threat Actors: Anonymous Algeria
    Victim Country: Israel
    Victim Industry: Network & Telecommunications
    Victim Organization: amos spacecom
    Victim Site: amos-spacecom.com
  18. Alleged unauthorized access to multiple unidentified cctv systems in Israel
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to multiple unidentified cctv systems in Israel
    Date: 2026-03-02T20:53:49Z
    Network: telegram
    Published URL: https://t.me/LulzSecBlack/4701
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6121a9ea-3d12-4c62-b6eb-069295c62893.jpg
    Threat Actors: LulzSec Black
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  19. Alleged unauthorized access to municipal systems in Saudi Arabia
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to municipal systems in Saudi Arabia, specifically referencing prominent cities including Mecca and Medina. According to the statement, the activity is framed as politically and ideologically motivated. The actor alleges unauthorized access to multiple city control interfaces
    Date: 2026-03-02T20:44:02Z
    Network: telegram
    Published URL: https://t.me/r3_6j/1851?single
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7bbde99b-7783-4ed8-92fb-c97cd50650e6.jpg
    Threat Actors: FAD Team
    Victim Country: Saudi Arabia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  20. ANONYMOUS SYRIA HACKERS claims to target Iran
    Category: Cyber Attack
    Content: A recent post by the group indicates that they are targetting Iran
    Date: 2026-03-02T20:39:51Z
    Network: telegram
    Published URL: https://t.me/anonymous_syriaa/4
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b6a7dc05-c523-4c67-9203-8977d3384184.jpg
    Threat Actors: ANONYMOUS SYRIA HACKERS
    Victim Country: Iran
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  21. Alleged data leak of EU Police Email Accounts
    Category: Data Breach
    Content: A threat actor claims to have leaked European Union law enforcement email accounts.
    Date: 2026-03-02T20:37:12Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-First-World-EU-High-Quality-Police-Emails
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b130ac0b-a196-4a85-8f98-393752abc748.png
    Threat Actors: lucy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  22. BABAYO EROR SYSTEM targets the websites of iGreentec Engineering
    Category: Defacement
    Content: The group claims to have defaced the website of iGreentec Engineering
    Date: 2026-03-02T20:31:40Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/185
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c9f743c7-6fee-4f35-afd3-62014ad007fe.jpg
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: UAE
    Victim Industry: Information Technology (IT) Services
    Victim Organization: igreentec engineering
    Victim Site: igreentec.ae
  23. Alleged data breach Ahmedabad Institute of Technology
    Category: Data Breach
    Content: The threat actor claims to have leaked data allegedly belonging to Ahmedabad Institute of Technology.
    Date: 2026-03-02T20:25:54Z
    Network: telegram
    Published URL: https://t.me/r3_6j/1841
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0134da0d-cf1e-4619-8873-63cfd6a767b7.png
    https://d34iuop8pidsy8.cloudfront.net/8a45593f-e9a0-4160-b6ea-97d4e0e8595e.png
    Threat Actors: FAD Team
    Victim Country: India
    Victim Industry: Education
    Victim Organization: ahmedabad institute of technology
    Victim Site: aitindia.in
  24. Alleged Data Breach of Fondation CGénial
    Category: Data Breach
    Content: The group claims to have compromised the database of La Fondation C Génial, a French non-profit promoting STEM education, to steal internal rules and official emails.
    Date: 2026-03-02T20:25:07Z
    Network: telegram
    Published URL: https://t.me/r3_6j/1849
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9ec3dc54-affc-44d8-a9d8-22607a9cdf30.png
    Threat Actors: FAD Team
    Victim Country: France
    Victim Industry: Civic & Social Organization
    Victim Organization: fondation cgénial
    Victim Site: cgenial.org
  25. BABAYO EROR SYSTEM targets the website of Department of Social Welfare and Development – Field Office 1 (DSWD FO1)
    Category: Defacement
    Content: The group claims to have defaced the website of Department of Social Welfare and Development – Field Office 1 (DSWD FO1).
    Date: 2026-03-02T20:12:20Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/207
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c215da60-b735-40ab-854a-ca113f65b73b.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Philippines
    Victim Industry: Government Administration
    Victim Organization: department of social welfare and development – field office 1 (dswd fo1)
    Victim Site: fo1.dswd.gov.ph
  26. BABAYO EROR SYSTEM targets the website of William & Mary
    Category: Defacement
    Content: The group claims to have defaced the website of William & Mary
    Date: 2026-03-02T20:08:34Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/207
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4f481d53-09d8-42fb-87fb-3850292a6d66.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: USA
    Victim Industry: Higher Education/Acadamia
    Victim Organization: william & mary
    Victim Site: wm.edu
  27. BABAYO EROR SYSTEM targets the website of Auburn University
    Category: Defacement
    Content: The group claims to have defaced the website of Auburn University.
    Date: 2026-03-02T20:06:13Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/207
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/90ebc126-c06d-41d5-9021-dca148a524c7.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: USA
    Victim Industry: Higher Education/Acadamia
    Victim Organization: auburn university
    Victim Site: cadc.auburn.edu
  28. BABAYO EROR SYSTEM targets the website of Center for Advanced Defense Community (CADC), Auburn University
    Category: Defacement
    Content: The group claims to have defaced the website of Center for Advanced Defense Community (CADC), Auburn University.
    Date: 2026-03-02T20:04:39Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/207
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8212c643-d58f-44ab-9c07-68e078953853.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: USA
    Victim Industry: Education
    Victim Organization: center for advanced defense community (cadc), auburn university
    Victim Site: cadc.auurn.edu
  29. Alleged data breach of unidentifed Law Firm company in israel.
    Category: Data Breach
    Content: The group claims to have leaked data of Unidentified Law Firm company in Israel.
    Date: 2026-03-02T20:02:24Z
    Network: telegram
    Published URL: https://t.me/c/2767021745/40
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/698978c1-cd06-4aef-955e-de63c10bad15.png
    Threat Actors: Team insane Pakistan
    Victim Country: Israel
    Victim Industry: Law Practice & Law Firms
    Victim Organization: Unknown
    Victim Site: Unknown
  30. BABAYO EROR SYSTEM targets the websites of Sekolah Pascasarjana UNIVERSITAS GADJAH MADA
    Category: Defacement
    Content: The group claims to have defaced the website of Sekolah Pascasarjana UNIVERSITAS GADJAH MADA.
    Date: 2026-03-02T20:01:18Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/207
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a218420b-82c2-4179-a60c-0d848a00e746.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Higher Education/Acadamia
    Victim Organization: sekolah pascasarjana universitas gadjah mada
    Victim Site: pasca.ugm.ac.id
  31. BABAYO EROR SYSTEM targets the websites of Universitas Budi Luhur
    Category: Defacement
    Content: The group claims to have defaced the website of Universitas Budi Luhur.
    Date: 2026-03-02T19:51:34Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/207
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8d919afe-34db-4aca-a183-6bb4d15b11cb.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Higher Education/Acadamia
    Victim Organization: universitas budi luhur
    Victim Site: journal.budiluhur.ac.id
  32. Alleged data breach of Hermon Laboratories
    Category: Data Breach
    Content: The group claims to have leaked data allegedly belonging to Hermon Laboratories.
    Date: 2026-03-02T19:48:10Z
    Network: telegram
    Published URL: https://t.me/c/2767021745/40
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/22a462bc-b83f-4842-91ff-53a43544441a.jpg
    Threat Actors: Team insane Pakistan
    Victim Country: Israel
    Victim Industry: Research Industry
    Victim Organization: hermon laboratories
    Victim Site: hermonlabs.com
  33. Alleged Data Breach of Dr. Oshrat Kastel
    Category: Data Breach
    Content: Threat Actor claims to have breached the database of Dr. Oshrat Kastel in Israel.
    Date: 2026-03-02T19:44:10Z
    Network: telegram
    Published URL: https://t.me/c/2259100562/929
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3b31c216-3546-43ae-9b47-bbc992397744.png
    https://d34iuop8pidsy8.cloudfront.net/f56c88ff-8601-4647-a396-f0df9f4877f6.png
    Threat Actors: NATION OF SAVIORS
    Victim Country: Israel
    Victim Industry: Hospital & Health Care
    Victim Organization: dr. oshrat kastel
    Victim Site: dr-kastel.co.il
  34. Alleged data breach of Income and Sales Tax Department (ISTD)
    Category: Data Breach
    Content: A threat actor claims to have leaked a data from the Income and Sales Tax Department (ISTD)
    Date: 2026-03-02T19:32:21Z
    Network: telegram
    Published URL: https://t.me/r3_6j/1833
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1ea5b5fe-a8e9-416c-9632-bd5cdc33f644.png
    Threat Actors: FAD Team
    Victim Country: Jordan
    Victim Industry: Government Administration
    Victim Organization: income and sales tax department (istd)
    Victim Site: istd.gov.jo
  35. Alleged data breach of Alumgate
    Category: Data Breach
    Content: The threat actor claims to have leaked data allegedly belonging to Alumgate.
    Date: 2026-03-02T19:27:15Z
    Network: telegram
    Published URL: https://t.me/c/2767021745/40
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8423af4c-72b6-4a09-b6bf-b6f925fc3fc1.png
    Threat Actors: Team insane Pakistan
    Victim Country: Israel
    Victim Industry: Building and construction
    Victim Organization: alumgate
    Victim Site: alumgate.co.il
  36. Alleged data breach of C Génial
    Category: Data Breach
    Content: A threat actor claims to have leaked a data from the French STEM education initiative C Génial.
    Date: 2026-03-02T19:16:15Z
    Network: telegram
    Published URL: https://t.me/r3_6j/1829
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/70ddd915-8865-44c3-807a-1f5224022e23.png
    Threat Actors: FAD Team
    Victim Country: France
    Victim Industry: Education
    Victim Organization: c génial
    Victim Site: cgenial.org
  37. Alleged data breach of NauticGear.nl
    Category: Data Breach
    Content: A threat actor claims to sell a database allegedly belonging to NauticGear.nl. the dataset reportedly contains 95,138 total records, including 94,633 unique email addresses and 90,514 unique phone numbers. the exposed data includes customer details such as full names, email addresses, phone numbers, dates of birth, tax or VAT numbers, and detailed billing information including street addresses, postal codes, cities, and company names.
    Date: 2026-03-02T19:10:38Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-nauticgear-nl
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/108cb9b4-cce4-4e2c-994c-980b2e023664.png
    Threat Actors: Wadjet
    Victim Country: Netherlands
    Victim Industry: E-commerce & Online Stores
    Victim Organization: nauticgear.nl
    Victim Site: nauticgear.nl
  38. BABAYO EROR SYSTEM targets the websites of Igreentec Engineering India Pvt Ltd
    Category: Defacement
    Content: The group claims to have defaced the website of Igreentec Engineering India Pvt Ltd
    Date: 2026-03-02T19:09:38Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/185
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/aa32ddc7-544f-4c2e-90ba-281ab48ddf1e.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: India
    Victim Industry: Manufacturing & Industrial Products
    Victim Organization: igreentec engineering india pvt ltd
    Victim Site: igreentec.in
  39. BABAYO EROR SYSTEM targets the website of IGREEN TECHNOLOGIES
    Category: Defacement
    Content: The group claims to have defaced the website of IGREEN TECHNOLOGIES.
    Date: 2026-03-02T19:05:26Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/185
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/de0d45de-1feb-4de9-950b-8d6284b9abc8.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: India
    Victim Industry: Machinery Manufacturing
    Victim Organization: igreen technologies
    Victim Site: igreentechnologies.in
  40. Alleged data breach of SkiWebShop
    Category: Data Breach
    Content: A threat actor claims to sell a database allegedly associated with SkiWebShop.nl. the exposed database allegedly contains structured customer records with fields such as entity ID, full name, email address, group ID, website ID, confirmation status, account creation date, date of birth, gender, tax/VAT information, account lock expiration, and detailed billing and shipping informations.
    Date: 2026-03-02T19:05:23Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-skiwebshop-nl
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a3039189-17ba-42d1-8e54-6c041f06252d.png
    Threat Actors: Wadjet
    Victim Country: Netherlands
    Victim Industry: E-commerce & Online Stores
    Victim Organization: skiwebshop
    Victim Site: skiwebshop.nl
  41. Alleged data breach of Fenerbahçe SK
    Category: Data Breach
    Content: A threat actor claims to sell data allegedly from Fenerbahçe SK. the dataset reportedly includes 52,953 consumer records and 174,479 virtual credit card entries. The data allegedly contains personal information such as full names, email addresses, phone numbers, dates of birth, and identification numbers.
    Date: 2026-03-02T18:57:19Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-fenerbahce-org
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f3ef2612-6d50-49d0-9319-7aca370b9604.png
    https://d34iuop8pidsy8.cloudfront.net/2032bfb1-7da2-4b28-894f-5f21623e2fff.png
    Threat Actors: Wadjet
    Victim Country: Turkey
    Victim Industry: Education
    Victim Organization: fenerbahçe sk
    Victim Site: fenerbahce.org
  42. Alleged unauthorized access to industrial greenhouse climate control (SCADA/ICS) systems
    Category: Initial Access
    Content: Threat actor claims to have gained unauthorized access to industrial greenhouse climate control (SCADA/ICS) systems in Kyiv, Ukraine, allegedly manipulating automated temperature controls and disrupting operations.
    Date: 2026-03-02T18:56:45Z
    Network: telegram
    Published URL: https://t.me/itarmyofrussianews/340
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1db255ec-3388-4c76-bcd6-25418fef237e.png
    Threat Actors: IT ARMY OF RUSSIA
    Victim Country: Ukraine
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  43. Alleged data breach of Blackstore
    Category: Data Breach
    Content: A threat actor claims to have a French database allegedly related to Blackstore.fr, stating that the dataset contains more than 124,000 entries. the exposed data allegedly includes last name, first name, email address, phone number, internal ID numbers, and additional numeric identifiers.
    Date: 2026-03-02T18:52:13Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-FR-blackstore-fr
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/01b04af5-428e-4489-9fbd-e99c02d93f58.png
    Threat Actors: TimeoRakin
    Victim Country: France
    Victim Industry: Retail Industry
    Victim Organization: blackstore
    Victim Site: blackstore.fr
  44. Alleged data breach of Trường THPT Lý Phú Dôn
    Category: Data Breach
    Content: The threat actor claims to have leaked the data from Trường THPT Lý Phú Dôn, a high school located in Ho Chi Minh City, Vietnam.
    Date: 2026-03-02T18:44:11Z
    Network: telegram
    Published URL: https://t.me/r3_6j/1816
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/601cb021-612b-4a12-8a0c-1b930106a032.png
    https://d34iuop8pidsy8.cloudfront.net/1eed70e7-5932-4984-88c9-d592c24136df.png
    https://d34iuop8pidsy8.cloudfront.net/33db1ecf-13fa-40a2-bb74-bc79da86799d.png
    Threat Actors: FAD Team
    Victim Country: Vietnam
    Victim Industry: Education
    Victim Organization: trường thpt lý phú dôn
    Victim Site: thptlyphudon.hcm.edu.vn
  45. Russian Legion claims to target Iron Dome of Israel
    Category: Alert
    Content: A recent post by the group indicates that they have gained access to the Iron Dome of Israel
    Date: 2026-03-02T18:35:30Z
    Network: telegram
    Published URL: https://t.me/ruLegionn/176?single
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ae34c63d-ea83-4eab-959a-4c25559f76fe.jpg
    Threat Actors: Russian Legion
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  46. Fatimion cyber team claims to target Kuwait
    Category: Alert
    Content: A recent post by the group indicates that they have leaked the database of the state of Kuwait
    Date: 2026-03-02T18:33:13Z
    Network: telegram
    Published URL: https://t.me/hak994/4885
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2a4571a6-128b-4c68-b491-e10fc71df8d5.jpg
    Threat Actors: Fatimion cyber team
    Victim Country: Kuwait
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  47. Alleged data breach of Dr. Panjabrao Deshmukh Krishi Vidyapeeth
    Category: Data Breach
    Content: A threat actor claims to have breached the official website of Dr. Panjabrao Deshmukh Krishi Vidyapeeth (pdkv.ac.in). The leaked data reportedly includes administrative access details, internal portal information, database credentials, and other sensitive university system data.
    Date: 2026-03-02T18:31:35Z
    Network: telegram
    Published URL: https://t.me/r3_6j/1807
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/cbfbee8e-d862-47fd-9a96-0ea630e3999c.png
    https://d34iuop8pidsy8.cloudfront.net/30546c9b-40e2-4d51-be1b-4e28c9052994.png
    Threat Actors: FAD Team
    Victim Country: India
    Victim Industry: Higher Education/Acadamia
    Victim Organization: dr. panjabrao deshmukh krishi vidyapeeth
    Victim Site: pdkv.ac.in
  48. Alleged data leak of French Passport PSD
    Category: Data Breach
    Content: The threat actor claims to have leaked data from French Passport
    Date: 2026-03-02T18:31:09Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-French-Passport-PSD
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d9317f3f-145c-437e-a53b-48a4ec4b116d.png
    Threat Actors: Vassilx
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  49. Alleged Unauthorized Access to Unidentified Camera System of Maccabi Health Services in Israel
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to unidentified internal camera systems of Maccabi Health Services, a major Israeli healthcare provider, by targeting its Internet of Things (IoT) infrastructure.
    Date: 2026-03-02T18:30:29Z
    Network: telegram
    Published URL: https://t.me/c/1651470668/1584
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d10daadb-eaa9-4cbd-9484-d782c644995a.png
    Threat Actors: Cyber ​​Islamic resistance
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  50. Alleged data leak of Aura.Build
    Category: Data Breach
    Content: The threat actor claims to have leaked a data from Aura.Build .the database reportedly contains information on more than 132,000 unique users.the exposed data includes user profile details and subscription-related information. which includes user ID, full name, biography, account creation and update timestamps, avatar URL, subscription status, subscription tier, Stripe customer and subscription IDs, subscription billing periods, cancellation details, administrative flags, usage metrics, available credits, project counts, feature flags, account status, email address, website, and location data.
    Date: 2026-03-02T18:20:03Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-Aura-Build-Database
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/657ff0b5-a67a-4fd8-a1e1-f3dffa702f28.png
    https://d34iuop8pidsy8.cloudfront.net/a3fb29bd-b26a-4e29-95d3-ad8ea05d23a3.png
    Threat Actors: ImVec4
    Victim Country: Unknown
    Victim Industry: Information Technology (IT) Services
    Victim Organization: aura.build
    Victim Site: aura.build
  51. FAD Team targets the website of Syrian Astronomical Association
    Category: Defacement
    Content: The group claims to have defaced the website of Syrian Astronomical Association
    Date: 2026-03-02T18:11:41Z
    Network: telegram
    Published URL: https://t.me/r3_6j/1799
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c80b77d1-6f56-4ec3-9145-b04f755a9cf7.png
    Threat Actors: FAD Team
    Victim Country: Syria
    Victim Industry: Non-profit & Social Organizations
    Victim Organization: syrian astronomical association
    Victim Site: saa.sy
  52. Alleged data leak of Israeli Population Database
    Category: Data Breach
    Content: The threat actor claims to have be leaked a database allegedly containing more than 3,000 records of Israeli citizens.
    Date: 2026-03-02T18:08:00Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-3000-ISRAELI-POPULATION-DATA
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d3f188e5-5fde-48e8-9386-06fe84a535a1.png
    Threat Actors: ShadowNex
    Victim Country: Israel
    Victim Industry: Government & Public Sector
    Victim Organization: Unknown
    Victim Site: Unknown
  53. FAD Team claims to target USA
    Category: Alert
    Content: A recent post by the group indicated that they are targeting USA.
    Date: 2026-03-02T18:07:58Z
    Network: telegram
    Published URL: https://t.me/r3_6j/1797
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/762fb34a-d442-49d1-ada8-1946d7554cba.png
    Threat Actors: FAD Team
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  54. Alleged data leak of Pakistani Government Procurement Tenders
    Category: Data Breach
    Content: The group caims to have compromised procurement tender databases associated with government entities in Pakistan, alleging full access to records spanning approximately 23 years. The purportedly affected entities include the Military Engineering Services (Air Force), the State Bank of Pakistan, Combined Military Hospital, Pakistan Navy, and Sui Northern Gas Limited, among others.
    Date: 2026-03-02T18:05:52Z
    Network: telegram
    Published URL: https://t.me/c/2156569801/2969
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8dd15648-787c-4354-878b-72e5036a637f.jpg
    Threat Actors: The Red Eagle
    Victim Country: Pakistan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  55. Alleged data breach of Habib Bank Limited
    Category: Data Breach
    Content: The group claims to have breached Habib Bank Limited (HBL), Pakistan, and gained access to sensitive database information. According to the post, the alleged data includes names, positions, contact numbers, Gmail addresses, account information, and payment transaction details.NB: They also warned that they will leak the database soon.
    Date: 2026-03-02T17:57:11Z
    Network: telegram
    Published URL: https://t.me/c/2156569801/2963
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fd9b33b6-c463-4cc1-8478-6df233894c3c.png
    Threat Actors: The Red Eagle
    Victim Country: Pakistan
    Victim Industry: Banking & Mortgage
    Victim Organization: habib bank limited
    Victim Site: hbl.com
  56. Fatimion cyber team claims to target Qatar
    Category: Alert
    Content: A recent post by the group indicates that they are targeting Qatar.
    Date: 2026-03-02T17:48:42Z
    Network: telegram
    Published URL: https://t.me/hak994/4866
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/31da7642-e264-451a-b857-6f712c12943e.png
    Threat Actors: Fatimion cyber team
    Victim Country: Qatar
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  57. Alleged Sale of Unauthorized Admin Access to an Unidentified Presta Shop in USA
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized PrestaShop admin panel access to a U.S.-based, allegedly enabling payment redirection via Stripe without login and indicating full administrative control over the website’s operations and transactions.
    Date: 2026-03-02T17:08:20Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277377/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9e2d0a6d-fba6-4420-9007-6dc325745768.png
    Threat Actors: YourDevExpert
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  58. Alleged data leak of ABAN Logistics
    Category: Data Breach
    Content: The group claims to have hacked into the systems of Aban Logistics and have leaked professional association membership cards, certificates of incorporation, and official operating permits linked to the company
    Date: 2026-03-02T16:29:33Z
    Network: openweb
    Published URL: https://x.com/AnonymousBsns/status/2028495132375347558?s=20
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d4eb6374-e41e-4df5-9777-7f340ea73baf.jpg
    Threat Actors: Anonymous
    Victim Country: Iran
    Victim Industry: Transportation & Logistics
    Victim Organization: aban logistics
    Victim Site: abanlog.com
  59. HackHax claims to target Israel
    Category: Alert
    Content: A recent post by the group indicates that theyre targeting Israel
    Date: 2026-03-02T16:20:20Z
    Network: telegram
    Published URL: https://t.me/c/2532678208/480
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/38d986e4-6c54-4614-bb4d-4e09ee828cba.jpg
    Threat Actors: HackHax
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  60. Keymous Plus claims to target Kuwait
    Category: Alert
    Content: A recent post by the group indicates that theyre targeting Kuwait
    Date: 2026-03-02T16:15:48Z
    Network: telegram
    Published URL: https://t.me/c/2588114907/823
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/594e1e52-d440-4c57-981c-4c5f9ab9606a.jpg
    Threat Actors: Keymous Plus
    Victim Country: Kuwait
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  61. Alleged unauthorized access to the systems of Delhi Jal Board (DJB)
    Category: Initial Access
    Content: The group claims to have compromised systems associated with the Delhi Jal Board in India, alleging control over the Coronation Water Treatment Plant, reportedly producing approximately 20 million gallons per day. According to the statement, the actor asserts takeover of the main control system, historical databases, equipment networks, tunnel systems, HVAC components, and server infrastructure.
    Date: 2026-03-02T16:02:37Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3853
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d10440a3-d872-4a0e-936e-f74e1d25b06d.jpg
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: India
    Victim Industry: Government Administration
    Victim Organization: delhi jal board (djb)
    Victim Site: djb.gov.in
  62. Alleged Unauthorized Access to Industrial Energy Management Terminal
    Category: Initial Access
    Content: Threat actor claims to have gained unauthorized access to an industrial energy management and smart building control terminal, allegedly providing centralized control over energy consumption monitoring, heating systems, security controls, alarm systems, and solar panel infrastructure.
    Date: 2026-03-02T15:59:40Z
    Network: telegram
    Published URL: https://t.me/op_morningstar/499
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/80caaa8b-2524-4d65-a459-dfab1f8ec4f9.png
    Threat Actors: MORNING STAR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  63. Alleged data breach of Al-Istiqlal University
    Category: Data Breach
    Content: The threat actor claims to be sharing a database allegedly containing approximately 4,200 records from Al-Istiqlal University. The threat actor states that the university specializes in security, military, and police sciences. The data which includes student number, email, birthdate details (year, month, day), and personal name fields (first name, father name, grandfather, family name).
    Date: 2026-03-02T15:59:03Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-Al-Istiqlal-University-4-2K-alistiqlal-edu-ps
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/bdb779a9-8428-4e8d-ab0f-6a2b673a9545.png
    Threat Actors: CVDEAD
    Victim Country: Palestine
    Victim Industry: Education
    Victim Organization: al-istiqlal university
    Victim Site: alistiqlal.edu.ps
  64. Alleged data leak of 450K USA Banking Leads Database
    Category: Data Breach
    Content: Threat Actor Claims to Be Selling 450K USA Banking Leads Database.
    Date: 2026-03-02T15:34:56Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277372/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a1e8aa3d-0623-49ed-852e-7b18b2333d82.png
    Threat Actors: HighRisk
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  65. Alleged data breach of Tchap
    Category: Data Breach
    Content: The threat actor claims to have scraped approximately 10,000+ member records and 7 conversations from Tchap, a secure messaging platform developed by the French government for public officials and civil servants. The data allegedly includes user email addresses associated with French government domains, sample images, and references to several scraped groups such as Police Nationale and other administrative groups.
    Date: 2026-03-02T15:27:20Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DOCUMENTS-FR-TCHAP-GOUV
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a023a470-2ed7-4519-b6a2-8ddac71368ce.png
    Threat Actors: epi
    Victim Country: France
    Victim Industry: Government & Public Sector
    Victim Organization: tchap
    Victim Site: tchap.gouv.fr
  66. Alleged Unauthorized Access to Joda ULB Water Treatment Plant Control System, India
    Category: Initial Access
    Content: The group claims to have gained access to the control and treatment system of the Joda ULB water treatment plant in Joda, operated by Water Corporation of Odisha (WATCO), and used the VoltRuptor tool to scan the network, identifying other connected systems within the same infrastructure and the spread of malware across the plant’s industrial control system network.
    Date: 2026-03-02T15:20:38Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3852
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9b5bddd4-d480-40c5-8b30-875164f719a5.png
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  67. Alleged data breach of Bioserveur
    Category: Data Breach
    Content: The threat actor claims to have exported approximately 2KB of data from Bioserveur, a secure online platform primarily used by healthcare professionals in France .
    Date: 2026-03-02T15:20:10Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-FR-BIOSERVEUR
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ddc31392-195d-416c-8e99-45507923edaa.png
    Threat Actors: epi
    Victim Country: France
    Victim Industry: Hospital & Health Care
    Victim Organization: bioserveur
    Victim Site: bioserveur.com
  68. Alleged leak of Israel data
    Category: Data Breach
    Content: The group claims to have leaked a dataset containing Facebook user information and personal details.
    Date: 2026-03-02T14:59:05Z
    Network: telegram
    Published URL: https://t.me/llllllllllllllllllllal/185
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1f424557-bde0-4697-ba8b-7404ee16b250.jpg
    Threat Actors: TikusXploit
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  69. FAD Team claims to target Qatar, Saudi Arabia, Bahrain, Jordan, Kuwait and UAE
    Category: Alert
    Content: A recent post by the group indicated that they are targeting Qatar, Saudi Arabia, Bahrain, Jordan, Kuwait and UAE.
    Date: 2026-03-02T14:52:31Z
    Network: telegram
    Published URL: https://t.me/r3_6j/1789
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/14f6c9a8-0232-4d53-8fe1-2932beb6a2cc.png
    Threat Actors: FAD Team
    Victim Country: Qatar
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  70. Cyber ​​Islamic resistance claims to target Israel
    Category: Alert
    Content: A recent post by the group indicated that they intends to target Israel
    Date: 2026-03-02T14:50:28Z
    Network: telegram
    Published URL: https://t.me/c/1651470668/1583
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8f34f1e8-a637-41f9-bf62-1319c6253213.jpg
    Threat Actors: Cyber ​​Islamic resistance
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  71. Evil Markhors -Dark Side of Pakistan Alliance targets the website of Deck & Engine Personnel Training Centre (DEPTC)
    Category: Defacement
    Content: The group claims to have defaced the website of Deck & Engine Personnel Training Centre (DEPTC)
    Date: 2026-03-02T14:49:27Z
    Network: telegram
    Published URL: https://t.me/c/2337310341/363
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/78bbd3b2-fe5d-4567-b7e0-1e9f9b4adced.png
    Threat Actors: Evil Markhors -Dark Side of Pakistan Alliance
    Victim Country: Bangladesh
    Victim Industry: Professional Training
    Victim Organization: deck & engine personnel training centre (deptc)
    Victim Site: deptcbarishal.com
  72. Alleged database leak of Attorney (CPA) Aaron Chismedia
    Category: Data Breach
    Content: The group claims to have breached the database of attorney (CPA) Aaron Chismedia.
    Date: 2026-03-02T13:15:46Z
    Network: telegram
    Published URL: https://t.me/c/2337310341/360
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/78829aaa-8f93-4bd3-8bc7-c7a4ba2af6bf.png
    Threat Actors: Evil Markhors -Dark Side of Pakistan Alliance
    Victim Country: Israel
    Victim Industry: Law Practice & Law Firms
    Victim Organization: attorney (cpa) aaron chismedia\
    Victim Site: atz-law.co.il
  73. Alleged data breach of Sumo Creative
    Category: Data Breach
    Content: The group claims to have breached data from Sumo Creative.
    Date: 2026-03-02T13:07:42Z
    Network: telegram
    Published URL: https://t.me/c/2337310341/360
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/59fa69e9-37b4-4926-a483-6a56f17d609a.png
    Threat Actors: Evil Markhors -Dark Side of Pakistan Alliance
    Victim Country: Israel
    Victim Industry: Graphic & Web Design
    Victim Organization: sumo creative
    Victim Site: sumocreative.co.il
  74. Alleged data breach of WOOD STORY
    Category: Data Breach
    Content: The group claims to have breached data from WOOD STORY.
    Date: 2026-03-02T13:01:27Z
    Network: telegram
    Published URL: https://t.me/c/2337310341/360
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/38502635-1a1c-47b0-8152-692c7e952579.png
    Threat Actors: Evil Markhors -Dark Side of Pakistan Alliance
    Victim Country: Israel
    Victim Industry: Architecture & Planning
    Victim Organization: wood story
    Victim Site: laser-cnc.co.il
  75. Alleged leak of Garment Exporter Database
    Category: Data Breach
    Content: The threat actor claims to have leaked the Garment Exporter Database. The compromised data reportedly contain exporter names, factory addresses, office addresses, etc.
    Date: 2026-03-02T12:56:58Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-Database-Eksportir-Garmen-India-Bangladesh
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5c3c65b2-1dfa-44a3-96ad-b9af02940b85.png
    Threat Actors: XZeeoneOfc
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  76. Alleged database leak of Through the hands
    Category: Data Breach
    Content: The group claims to have breached database of Through the hands.
    Date: 2026-03-02T12:55:11Z
    Network: telegram
    Published URL: https://t.me/c/2337310341/360
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/83ea2128-05a3-48d7-b1c5-a2abbedc604e.png
    Threat Actors: Evil Markhors -Dark Side of Pakistan Alliance
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: through the hands
    Victim Site: derech-hayadaim.co.il
  77. Alleged data breach of Dr. Castel
    Category: Data Breach
    Content: The group claims to have breached data from Dr. Castel.
    Date: 2026-03-02T12:52:02Z
    Network: telegram
    Published URL: https://t.me/c/2337310341/360
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7758eb11-e787-4347-a9b2-3bf1917dc92c.png
    Threat Actors: Evil Markhors -Dark Side of Pakistan Alliance
    Victim Country: Israel
    Victim Industry: Hospital & Health Care
    Victim Organization: dr. castel
    Victim Site: dr-kastel.co.il
  78. HellR00ters Team claims to target USA
    Category: Alert
    Content: A recent post by the group indicated that they intends to target USA.
    Date: 2026-03-02T12:49:54Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1081
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/395ea544-1c6c-4475-aff5-64884c00eaec.png
    Threat Actors: HellR00ters Team
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  79. Alleged leak of Human Rights Monitoring Database
    Category: Data Breach
    Content: The threat actor claims to have leaked the Human Rights Monitoring Database. The compromised data reportedly contain general information, region details, report publication dates, etc.
    Date: 2026-03-02T12:46:05Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DOCUMENTS-Leaked-by-Zeeone-Grayhat-Human-Rights-Monitoring-Database
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/cafc8eaa-75fe-4bf4-8733-6a3a2dc269a9.png
    Threat Actors: XZeeoneOfc
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  80. Nicotine targets the website of Gabisha Air Couture UAE
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Gabisha Air Couture UAE
    Date: 2026-03-02T12:43:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796571
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/17e6dc3c-b7be-49ad-b343-b3a5c54d9321.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Other Industry
    Victim Organization: gabisha air couture uae
    Victim Site: gabishaircoutureuae.com
  81. Nicotine targets the website of Super Car Auto Accessories Fitting LLC
    Category: Defacement
    Content: Group claims to have take down the website of Super Car Auto Accessories Fitting LLC.
    Date: 2026-03-02T12:40:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796589
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3cd7bf8c-55f3-46f6-8986-5932c3579ad5.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Automotive
    Victim Organization: super car auto accessories fitting llc
    Victim Site: supercargarageuae.com
  82. Nicotine targets the website of Rubix
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Rubix.
    Date: 2026-03-02T12:37:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796414
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f0d477d2-4fd8-4978-af64-0743e8d6576a.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Building and construction
    Victim Organization: rubix
    Victim Site: rubix-uae.com
  83. Nicotine targets the website of HD Digital Media
    Category: Defacement
    Content: Group claims to have defaced the website of HD Digital Media.
    Date: 2026-03-02T12:37:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796576
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ff5b5a56-a9b1-4ea9-b9ff-54583187af57.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: hd digital media
    Victim Site: hdmediauae.com
  84. Nicotine targets the website of kaffeology cafe
    Category: Defacement
    Content: Group claims to have deface the website of kaffeology cafe.
    Date: 2026-03-02T12:33:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796579
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c361edf6-6764-416b-9413-b3a02838bc67.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Restaurants
    Victim Organization: kaffeology cafe
    Victim Site: kaffeologydubai.com
  85. Nicotine targets the website of Sweet Home Spa
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Sweet Home Spa.
    Date: 2026-03-02T12:33:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796590
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/67f0ba23-90c3-4615-851f-bc68224d8086.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Recreational Facilities & Services
    Victim Organization: sweet home spa
    Victim Site: sweethomespadubai.com
  86. Nicotine targets the website of Coco N Curry
    Category: Defacement
    Content: The Group claims to have defaced the website of Coco N Curry.
    Date: 2026-03-02T12:32:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796568
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8f2dcddb-1f3d-4423-9be3-9e1792f4775b.jpg
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Food & Beverages
    Victim Organization: coco n curry
    Victim Site: coconcurrydubai.com
  87. Nicotine targets the website of Al Falak Cafe
    Category: Defacement
    Content: Group claims to have defaced the website of Al Falak Cafe.
    Date: 2026-03-02T12:30:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796556
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7bb08a2c-dbbf-449b-9561-2394d74e311d.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Hospital & Health Care
    Victim Organization: al falak cafe
    Victim Site: alfalakcafedubai.com
  88. Nicotine targets the website of MerryGlam Beauty Salon
    Category: Defacement
    Content: The threat actor claims to have defaced the website of MerryGlam Beauty Salon.
    Date: 2026-03-02T12:27:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796584
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a8f564e6-f890-4cc6-a900-9e75116b9c7d.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Other Industry
    Victim Organization: merryglam beauty salon
    Victim Site: merryglamdubai.com
  89. Nicotine targets the website of Luna Land Dubai
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Luna Land Dubai.
    Date: 2026-03-02T12:25:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796582
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/600abc95-70f2-4816-bc59-78fcf4de95c5.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Retail Industry
    Victim Organization: luna land
    Victim Site: lunalanddubai.com
  90. EXADOS targets the website of Klong Suan Organization
    Category: Defacement
    Content: Group claims to have defaced the website of Klong Suan Organization.
    Date: 2026-03-02T12:11:30Z
    Network: telegram
    Published URL: https://t.me/EXA_DOS_KH/179
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/31d1982d-4757-4128-8e8e-155254eddf10.png
    Threat Actors: EXADOS
    Victim Country: Thailand
    Victim Industry: Education
    Victim Organization: klong suan organization
    Victim Site: ph-klongsuan.org
  91. Alleged leak of admin access to SB Express Courier
    Category: Initial Access
    Content: The group claims to have leaked admin login credentials to SB Express Courier.
    Date: 2026-03-02T12:10:08Z
    Network: telegram
    Published URL: https://t.me/ZeroCertHackers/1241
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/23f28826-ad36-4363-adca-46b5ef1fa3f7.png
    Threat Actors: KINGSMAN SOCIAL WING
    Victim Country: Bangladesh
    Victim Industry: Package & Freight Delivery
    Victim Organization: sb express courier
    Victim Site: sbexpress.com.bd
  92. Alleged breach of Israel Opportunity – Energy Resources, LP
    Category: Data Breach
    Content: The group has claimed responsibility for a cyberattack targeting Israel Opportunity Energy, an oil and gas exploration company. They allege that the company’s systems have been compromised and that elements of the broader oil and gas sector’s cyber infrastructure are being impacted.
    Date: 2026-03-02T12:02:36Z
    Network: openweb
    Published URL: https://x.com/HANDALA_RSS/status/2028429133399671108?s=20
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b0d8a328-f998-4fce-8c95-f212d932e430.jpg
    Threat Actors: Handala
    Victim Country: Israel
    Victim Industry: Oil & Gas
    Victim Organization: israel opportunity – energy resources, lp
    Victim Site: oilandgas.co.il
  93. Alleged Hack of Israel Opportunity
    Category: Cyber Attack
    Content: Group claims to have hacked the Israel Opportunity company.
    Date: 2026-03-02T11:59:59Z
    Network: openweb
    Published URL: https://x.com/HANDALA_RSS/status/2028429133399671108
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7fa9f477-9b40-44f6-a5e9-e4a90005a693.png
    Threat Actors: Handala Hack
    Victim Country: Israel
    Victim Industry: Oil & Gas
    Victim Organization: israel opportunity
    Victim Site: oilandgas.co.il
  94. Akatsuki cyber team targets CCTV cameras from Israel
    Category: Alert
    Content: Group claims to have hacked 4,150 CCTV and security cameras from Israel.
    Date: 2026-03-02T11:42:22Z
    Network: telegram
    Published URL: https://t.me/Akatsukiyberteam/652
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9e61a788-2c9f-4e03-b144-7e150ca6cb90.png
    Threat Actors: Akatsuki cyber team (official)
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  95. Alleged leak of passports and birth certificates from Israel
    Category: Data Breach
    Content: The group claims to have leaked 120 passports and birth certificates of Israeli citizens.
    Date: 2026-03-02T11:40:11Z
    Network: telegram
    Published URL: https://t.me/Akatsukiyberteam/656
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7d2062fd-b16c-4096-a1f1-54468c6b51da.png
    Threat Actors: Akatsuki cyber team (official)
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  96. BABAYO EROR SYSTEM claims to target Israel
    Category: Alert
    Content: A recent post by the group indicated that they intends to target Israel.
    Date: 2026-03-02T11:36:04Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/175
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/48eba23b-5ca2-41a7-9407-97bce40329f2.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  97. Alleged leak of GSIS
    Category: Data Breach
    Content: The threat actor claims to have leaked GSIS subsidy beneficiary information
    Date: 2026-03-02T11:29:59Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-COLLECTION-GSIS-SUBSIDY-BENEFICIARY-INFORMATION
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4d72b065-3502-431c-b60a-b874dbd6e0ef.png
    Threat Actors: N0XV3RITAS
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: gsis.ac.in
  98. Nicotine targets the website of Unique Homes
    Category: Defacement
    Content: The group claims to have defaced the website of Unique Homes.
    Date: 2026-03-02T11:08:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796591
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/972ef61a-03f9-4cb5-aab4-ca79377112ac.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Real Estate
    Victim Organization: unique homes
    Victim Site: uniquehomes.ae
  99. Nicotine targets the website of Grillino
    Category: Defacement
    Content: Group claims to have defaced the website of Grillino.
    Date: 2026-03-02T11:06:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796567
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/95a6cbbb-eba7-46e0-8bcf-d7a0a755691a.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Food & Beverages
    Victim Organization: grillino
    Victim Site: chickenhouse.ae
  100. Nicotine targets the website of HD Digital Media
    Category: Defacement
    Content: The group claims to have defaced the website of HD Digital Media.
    Date: 2026-03-02T11:06:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796575
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fb430842-4ff2-4be7-9acf-b26f1f45ea2c.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: hd digital media
    Victim Site: hddigitalmedia.ae
  101. Nicotine targets the website of Cash For Gold
    Category: Defacement
    Content: Group claims to have deface the website of Cash For Gold.
    Date: 2026-03-02T11:01:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796566
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/78b0bad5-d336-4c39-8616-29ded6ee9cba.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Luxury Goods & Jewelry
    Victim Organization: cash for gold
    Victim Site: cashforgold.ae
  102. Nicotine targets the website of Aster Flower
    Category: Defacement
    Content: Group claims to have deface the website of Aster Flower.
    Date: 2026-03-02T10:58:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796559
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c18a62e7-3e65-43c1-937c-c55462385e74.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Retail Industry
    Victim Organization: aster flower
    Victim Site: asterflower.ae
  103. Nicotine targets the website of Hascut Gents Salon
    Category: Defacement
    Content: The group claims to have defaced the website of Hascut Gents Salon.
    Date: 2026-03-02T10:58:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796574
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5b6b03bf-1d8f-464c-889f-e1afd062d837.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Other Industry
    Victim Organization: hascut gents salon
    Victim Site: hascut.ae
  104. Alleged data breach of Facebook
    Category: Data Breach
    Content: Threat actor claims to have breached data from Facebook. The compromised data reportedly contain phone numbers, Facebook IDs, names, gender, location, relationship status, city, country, and other profile-related details.
    Date: 2026-03-02T10:42:36Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-DATA-BASE-FACEBOOK-COUNTRY-ISRAEL-305-419-THOUSAND
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a44e6848-d222-44fe-aac1-779686161347.png
    Threat Actors: CinCauGhas
    Victim Country: Israel
    Victim Industry: Social Media & Online Social Networking
    Victim Organization: facebook
    Victim Site: facebook.com
  105. Hax.or targets the website of CRAFTD
    Category: Defacement
    Content: Group claims to have deface the website of CRAFTD.
    Date: 2026-03-02T10:29:00Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/108652
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/73e1627d-cc18-440c-9d71-a5c38212a149.png
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Furniture
    Victim Organization: craftd
    Victim Site: craftd.ae
  106. Alleged data breach of Mobile Premier League (MPL)
    Category: Data Breach
    Content: The threat actor claims to have breached data from Mobile Premier League (MPL).
    Date: 2026-03-02T10:18:34Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277341/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f4021100-3e32-403f-a1d2-78c7ad5ea69b.png
    Threat Actors: HighRisk
    Victim Country: India
    Victim Industry: Gambling & Casinos
    Victim Organization: mobile premier league (mpl)
    Victim Site: mpl.live
  107. Alleged Data Breach of High-Rich Online Shoppe
    Category: Data Breach
    Content: Threat Actor claims to have breached data from High-Rich Online Shoppe.
    Date: 2026-03-02T10:08:20Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277340/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c3b59a11-9f9c-4e67-b6ff-341ede0318bc.png
    Threat Actors: HighRisk
    Victim Country: India
    Victim Industry: Retail Industry
    Victim Organization: high-rich online shoppe
    Victim Site: highrich.in
  108. Alleged Leak of France Big Data
    Category: Data Breach
    Content: The threat actor claims to have leaked a large French dataset along with five additional databases.
    Date: 2026-03-02T10:05:16Z
    Network: openweb
    Published URL: https://leakbase.la/threads/france-big-data-5-db-uhq.49206/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/30b3461f-bb81-48b3-94d2-eee9826a4264.png
    Threat Actors: ForensicBoy
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  109. Allegedly leaked 250 k US SSN with personal data
    Category: Data Breach
    Content: Group claims to have access to US 250K SSN.
    Date: 2026-03-02T09:41:56Z
    Network: openweb
    Published URL: https://leakbase.la/threads/250-k-usa-ssn-leak.49220/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e6d6f22f-dde7-4e11-9040-451cc3d45054.png
    Threat Actors: breezzaz
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  110. Hax.or targets the website of PENTA TECHNICAL SERVICES LLC
    Category: Defacement
    Content: The group claims to have defaced the website of PENTA TECHNICAL SERVICES LLC
    Date: 2026-03-02T09:29:55Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/112902
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a120040e-267b-4257-8765-e24e23fc57df.jpg
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Mechanical or Industrial Engineering
    Victim Organization: penta technical services llc
    Victim Site: pentaa.ae
  111. Alleged leak of USA High Income data
    Category: Data Breach
    Content: Threat actor claims to have leaked USA High Income Database.
    Date: 2026-03-02T09:23:47Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-USA-High-Income-Database
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c5b13bfd-5284-4c38-89a6-4a9e413742db.png
    Threat Actors: Heferi
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  112. Hax.or targets the website of Al Furjan Villas
    Category: Defacement
    Content: Group claims to have deface the website of Al Furjan Villas.
    Date: 2026-03-02T09:22:57Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/111658
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a01330ff-aab8-4723-a856-594a6257cb43.png
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Real Estate
    Victim Organization: al furjan villas
    Victim Site: alfurjanvillas.ae
  113. Hax.or targets the website of visionenergyksa.ae
    Category: Defacement
    Content: The group claims to have defaced the website of visionenergyksa.ae.
    Date: 2026-03-02T09:20:26Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/112912
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1b02b840-d570-4b2f-8466-773b98dbbeec.png
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: visionenergyksa.ae
  114. Alleged defacement of Teeba Engineering Industries LLC
    Category: Defacement
    Content: Reports indicate that the website of Teeba Engineering Industries LLC was defaced.
    Date: 2026-03-02T09:19:58Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/111828
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/375e56da-84eb-4029-8a96-c72d2f7be6e8.png
    Threat Actors: Unknown
    Victim Country: UAE
    Victim Industry: Machinery Manufacturing
    Victim Organization: teeba engineering industries llc
    Victim Site: teeba.ae
  115. Hax.or targets the website of Genesis group
    Category: Defacement
    Content: The group claims to have defaced the website of Genesis group.
    Date: 2026-03-02T09:07:58Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/112904
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b2dee472-ae06-464a-b593-e1b52c880fca.jpg
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Manufacturing & Industrial Products
    Victim Organization: genesis group
    Victim Site: genesisgt.ae
  116. Alleged unauthorized access to the remote control systems of Control Applications Ltd
    Category: Initial Access
    Content: The group claims to have compromised over 130 remote control systems of Control Applications Ltd deployed in multiple countries, including Israel, Turkey, Poland, and several Gulf states.
    Date: 2026-03-02T09:00:11Z
    Network: telegram
    Published URL: https://t.me/c/1651470668/1565
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3d829b38-32f3-421b-9554-e59aec0c9480.png
    Threat Actors: Cyber ​​Islamic resistance
    Victim Country: Israel
    Victim Industry: Manufacturing
    Victim Organization: control applications ltd
    Victim Site: ddc.co.il
  117. Hax.or targets the website of Smart Union
    Category: Defacement
    Content: The group claims to have defaced the website of Smart Union.
    Date: 2026-03-02T08:52:09Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/114495
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/19d0add2-fe91-408d-93b6-70dd689da216.png
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Banking & Mortgage
    Victim Organization: smart union
    Victim Site: smartunion.ae
  118. Hax.or targets the website of MIB Consultants
    Category: Defacement
    Content: The group claims to have defaced the website of MIB Consultants.
    Date: 2026-03-02T08:40:50Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/115855
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/98b0efbc-b3d6-47ac-b974-9ad82a6f7e96.jpg
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Human Resources
    Victim Organization: mib consultants
    Victim Site: mibconsultants.ae
  119. Alleged Data Leak of Experian Ltd UK Consumer Database
    Category: Data Breach
    Content: A threat actor claims to have leaked a UK consumer database. The dataset reportedly contains around 7 million records, including names, dates of birth, contact details, addresses, employment information, and financial data of UK residents,
    Date: 2026-03-02T08:01:51Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Finally-found-a-real-database-4-U-which-I-know-will-get-downloaded
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4286818e-019a-4af2-9621-a38b8eacbba4.png
    https://d34iuop8pidsy8.cloudfront.net/b6a1948d-869c-45cc-8e41-ef73a5f71009.png
    Threat Actors: OriginalCrazyOldFart
    Victim Country: UK
    Victim Industry: Financial Services
    Victim Organization: experian ltd
    Victim Site: experian.co.uk
  120. Z-Net claims to target Israel
    Category: Alert
    Content: A recent post by the group indicated that they intends to target Israel.
    Date: 2026-03-02T07:44:58Z
    Network: telegram
    Published URL: https://t.me/ZNet_official/22
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7ca219be-9ce8-4498-ab1d-1c6e61399f76.png
    Threat Actors: Z-Net
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  121. Hax.or targets the website of Daukal Rizq
    Category: Defacement
    Content: The group claims to have defaced the website of Daukal Rizq
    Date: 2026-03-02T07:41:42Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/117609
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2a8ee8aa-7d4a-4efe-b543-be3e23ccf76b.png
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Unknown
    Victim Organization: daukal rizq
    Victim Site: daukalrizq.ae
  122. Cyberattack hit Nobitex
    Category: Cyber Attack
    Content: A cyberattack hit Iran’s largest cryptocurrency exchange, Nobitex.
    Date: 2026-03-02T07:39:20Z
    Network: openweb
    Published URL: https://x.com/306_vishal80616/status/2028320717482393825?s=20
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/da748919-b09b-4a3f-b281-7dc32f497a85.png
    Threat Actors: Unknown
    Victim Country: Iran
    Victim Industry: Financial Services
    Victim Organization: nobitex
    Victim Site: nobitex.market
  123. Alleged data leak of Israel Citizens
    Category: Data Breach
    Content: The threat actor claims to have leaked a dataset containing personal information of approximately 4.69 million Israeli citizens. The exposed data allegedly includes phone numbers, user IDs, email addresses, first and last names, gender, date registered, date of birth, location, hometown, relationship status, last year of education, work details, groups, pages, last update timestamp, and account creation time.
    Date: 2026-03-02T07:31:59Z
    Network: openweb
    Published URL: https://leakbase.la/threads/4-69m-israel-million-citizens-data.49219/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9104fe43-7472-42c5-9bd3-1127be728d62.png
    Threat Actors: bzaari
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  124. Alleged Data Leak of National Consortium for the Study of Terrorism and Responses to Terrorism
    Category: Data Breach
    Content: A threat actor claims to have leaked data from the National Consortium for the Study of Terrorism and Responses to Terrorism , University of Maryland. The compromised data reportedly contains 209,705 records, IDs, dates, locations, attack types, target information, casualty figures, weapon types, and perpetrator details.
    Date: 2026-03-02T07:22:00Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-GTD-%E2%80%93-Global-Terrorism-Database-209-705-Entries-JSON-602-7-MB
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5a6ef0b4-01d1-422b-a299-e3e6e766bdb8.png
    https://d34iuop8pidsy8.cloudfront.net/61aaa37c-fd84-4a1b-8180-2d38013cc15f.png
    Threat Actors: Kinda
    Victim Country: USA
    Victim Industry: Research Industry
    Victim Organization: national consortium for the study of terrorism and responses to terrorism
    Victim Site: start.umd.edu
  125. Hax.or targets the website of PlotLocator.ae
    Category: Defacement
    Content: The group claims to have defaced the website of PlotLocator.ae.
    Date: 2026-03-02T07:07:14Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/117622
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a631bb74-1db3-4da0-8134-40dc328fdd1a.png
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Government & Public Sector
    Victim Organization: plotlocator.ae
    Victim Site: plotlocator.ae
  126. BABAYO EROR SYSTEM targets the website of donnapiromalli.servicereviews.net
    Category: Defacement
    Content: The group claims to have defaced the website of donnapiromalli.servicereviews.net
    Date: 2026-03-02T07:05:38Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/159
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/429f2bef-ec43-4e88-b970-4650545bae78.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: donnapiromalli.servicereviews.net
  127. Hax.or targets the website of AVC Properties
    Category: Defacement
    Content: The group claims to have defaced the website of AVC Properties.
    Date: 2026-03-02T07:01:21Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/117625
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d58d3533-5cba-4dab-9901-6f04a207f7ce.png
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Real Estate
    Victim Organization: avc properties
    Victim Site: avcholding.com
  128. Hax.or targets the website of Legacy Homes Development
    Category: Defacement
    Content: The group claims to have defaced the website of Legacy Homes Development
    Date: 2026-03-02T06:49:31Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/127143
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6d9362e9-04cd-46ab-aa54-babd82330f0a.png
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Real Estate
    Victim Organization: legacy homes development
    Victim Site: legacy-homes.ae
  129. Alleged data leak of Unistream Bank & Money Transfers
    Category: Data Breach
    Content: Threat actor claims to have leaked a database of Unistream Bank & Money Transfers. The compromised data reportedly includes full name, full identification, phone numbers, passport details etc.
    Date: 2026-03-02T06:35:22Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-unistream-ru-107kk-SELL
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1bcab3cc-2859-4607-a377-9705fbd86868.png
    Threat Actors: btCC
    Victim Country: Russia
    Victim Industry: Financial Services
    Victim Organization: unistream bank & money transfers
    Victim Site: unistream.ru
  130. Alleged Data Breach of Universidad de Investigación y Desarrollo
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Universidad de Investigación y Desarrollo (UDI), the dataset contains student-related information including student identification numbers, names, and institutional email addresses.
    Date: 2026-03-02T06:34:43Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-CO-UDI-EDU-CO
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5009e71b-c40c-457b-a5af-ddcc8ac3a3ed.png
    Threat Actors: NyxarGroup
    Victim Country: Colombia
    Victim Industry: Education
    Victim Organization: universidad de investigación y desarrollo (udi)
    Victim Site: udi.edu.co
  131. Hax.or targets the website of Metastar Events
    Category: Defacement
    Content: The group claims to have defaced the website of Metastar Events.
    Date: 2026-03-02T06:30:26Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/117623
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d105e675-6845-4d24-b536-d01faf2ae61f.png
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Events Services
    Victim Organization: metastar events
    Victim Site: metastar.ae
  132. Alleged unauthorized access to Jordan Silos company
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to Jordan Silos company
    Date: 2026-03-02T06:29:46Z
    Network: telegram
    Published URL: https://t.me/c/1651470668/1559
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/20836ada-b3fe-411a-85c9-dfa648fb13bb.png
    https://d34iuop8pidsy8.cloudfront.net/8c0de1d7-92a6-4bd6-88df-5e997315c3d8.png
    Threat Actors: Cyber ​​Islamic resistance
    Victim Country: Jordan
    Victim Industry: Import & Export
    Victim Organization: jordan silos company
    Victim Site: josilos.com
  133. Hax.or targets the website of Wild Goose Events
    Category: Defacement
    Content: The group claims to have defaced the website of Wild Goose Events
    Date: 2026-03-02T06:16:11Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/127151
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7b0fcc3e-f72f-49c6-957f-6205f6b5e4bd.png
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Events Services
    Victim Organization: wild goose events
    Victim Site: wildgoose.ae.socialnetworkdubai.com
  134. Hax.or targets the website of Woodtech LLC
    Category: Defacement
    Content: Group claims to have defaced the website of Woodtech LLC
    Date: 2026-03-02T06:15:18Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/127910
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a3cf9927-a731-4004-8728-b37ca6e26429.png
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Manufacturing
    Victim Organization: woodtech llc
    Victim Site: woodtechllc.ae
  135. Hax.or targets the website of AVC Properties
    Category: Defacement
    Content: The group claims to have defaced the website of AVC Properties.
    Date: 2026-03-02T06:11:41Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/117621
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/182c3938-a7ad-467c-8303-d8f83d17fae4.png
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Real Estate
    Victim Organization: avc properties
    Victim Site: tenancycontract.ae
  136. Hax.or targets the website of The Legacy Homes
    Category: Defacement
    Content: The group claims to have defaced the website of The Legacy Homes.
    Date: 2026-03-02T06:03:00Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/127143
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f323e81e-f587-40ec-9e11-b25bdce7a85c.png
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Real Estate
    Victim Organization: the legacy homes
    Victim Site: legacyhomes.ae
  137. Alleged data leak of InterPals
    Category: Data Breach
    Content: The group claims to have leaked data from InterPalsNB: The organization was previously breached on 16 June 2025
    Date: 2026-03-02T05:56:18Z
    Network: telegram
    Published URL: https://t.me/c/3716986899/157
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3387a479-2d71-414e-ba1d-5189aa360de0.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Israel
    Victim Industry: Social Media & Online Social Networking
    Victim Organization: interpals
    Victim Site: interpals.net
  138. L4663R666H05T targets the website of Homes r Us
    Category: Defacement
    Content: The group claims to have defaced the website of Homes r Us, Qatar.
    Date: 2026-03-02T05:38:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/795989
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/13dd4c72-ad3c-4a6a-bee3-450ee90e067f.png
    Threat Actors: L4663R666H05T
    Victim Country: Qatar
    Victim Industry: Furniture
    Victim Organization: homes r us
    Victim Site: homesrus.qa
  139. Hax.or targets the website of RJAC Solutions
    Category: Defacement
    Content: Group claims to have defaced the website of RJAC Solutions.
    Date: 2026-03-02T05:31:30Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/128402
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ccce8d98-3462-4a6b-9fc3-15976012b527.png
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Management Consulting
    Victim Organization: rjac solutions
    Victim Site: rjacsolutions.ae
  140. L4663R666H05T targets the website of Sports Corner
    Category: Defacement
    Content: The group claims to have defaced the website of Sports Corner, Qatar.
    Date: 2026-03-02T05:27:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796104
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/19ac9de1-8c8e-41ef-88d8-558de290665f.png
    Threat Actors: L4663R666H05T
    Victim Country: Qatar
    Victim Industry: E-commerce & Online Stores
    Victim Organization: sports corner
    Victim Site: sportscorner.qa
  141. Alleged Data Breach of SiCepat
    Category: Data Breach
    Content: The threat actor claims to have breached the database of SiCepat. The dataset contains employee-related records, including national identification numbers (NIK), personal information, employment classifications, and branch assignment details.
    Date: 2026-03-02T05:21:08Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SICEPAT
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/85ff43ff-3527-4ee9-92e6-93a0520d128d.png
    Threat Actors: lllllllllllllllllili
    Victim Country: Indonesia
    Victim Industry: Transportation & Logistics
    Victim Organization: sicepat ekspres
    Victim Site: sicepat.com
  142. Hax.or targets the website of SVECO Engineering Consultants
    Category: Defacement
    Content: Group claims to have defaced the website of SVECO Engineering Consultants.
    Date: 2026-03-02T05:13:37Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/128430
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/28d10e34-bdc0-4529-ba5d-2297680837db.png
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Building and construction
    Victim Organization: sveco engineering consultants
    Victim Site: sveco.ae
  143. L4663R666H05T targets thee website of Sports for less
    Category: Defacement
    Content: The group claims to have defaced the website of Sports for less, Qatar.
    Date: 2026-03-02T05:12:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/796105
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/84cdb0d9-e3d9-4fe6-b16e-1e33a66b08c8.png
    Threat Actors: L4663R666H05T
    Victim Country: Qatar
    Victim Industry: E-commerce & Online Stores
    Victim Organization: sports for less
    Victim Site: sportsforless.qa
  144. Alleged Data Leak of Paris Hospital database
    Category: Data Breach
    Content: The threat actor claims to have leaked the Paris Hospital database. The dataset allegedly contains medical records and sensitive patient information.
    Date: 2026-03-02T04:48:54Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-FR-HOPITAL-DE-PARIS
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3d86b1ad-6f8f-4689-8ebd-c696497bd345.png
    Threat Actors: epi
    Victim Country: France
    Victim Industry: Hospital & Health Care
    Victim Organization: Unknown
    Victim Site: Unknown
  145. Simsimi targets the website of Alsultan Sweets
    Category: Defacement
    Content: The group claims to have defaced the website of Alsultan Sweets, UAE.
    Date: 2026-03-02T04:40:44Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41579383
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/16268a21-6e1e-441e-a159-1df773caf6fa.png
    Threat Actors: Simsimi
    Victim Country: UAE
    Victim Industry: Food & Beverages
    Victim Organization: alsultan sweets
    Victim Site: alsultansweets.ae
  146. Alleged Data Breach of DVM Records
    Category: Data Breach
    Content: The threat actor claims to have breached the database of DVM Records, the dataset includes sample records displaying customer email addresses, personal identifiers, and shipping details.
    Date: 2026-03-02T04:32:05Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-FR-DVM-RECORDS
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e23390e4-b9b8-492d-9c6c-45f12ef43b95.png
    Threat Actors: epi
    Victim Country: France
    Victim Industry: Music
    Victim Organization: dvm records
    Victim Site: dvmrecords.com
  147. DieNet claims to target multiple targets
    Category: Alert
    Content: The group claims to targets multiple websites. The group lists the following entities among its alleged targets:Public Institution for Social Security Services (Kuwait)General Organization for Social Insurance (Bahrain)Abu Dhabi Digital AuthorityGovernment Media Office of QatarNational Center for Crisis Management (Kuwait)Yah Bank
    Date: 2026-03-02T04:31:46Z
    Network: telegram
    Published URL: https://t.me/dienet3/320
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b30fe94a-86ce-4c75-9bc8-1128303bfc6e.png
    Threat Actors: DieNet
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: public institution for social security services (kuwait)
    Victim Site: Unknown
  148. 1H3X-TN targets the website of filehurt.ir
    Category: Defacement
    Content: The group claims to have defaced the website of filehurt.ir.
    Date: 2026-03-02T04:16:46Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41580714
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a6aa0357-8dab-4179-a8cf-cceb9b3d6009.png
    Threat Actors: 1H3X-TN
    Victim Country: Iran
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: filehurt.ir
  149. Alleged data leak of Tsunami Tsolutions
    Category: Data Breach
    Content: Threat actor claims to have leaked the database of Tsunami Tsolutions, allegedly containing 562 GB of compromised data.
    Date: 2026-03-02T04:02:09Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277092/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b0b91c03-0f27-4f5f-a61c-214024221031.png
    Threat Actors: Everestgroup
    Victim Country: USA
    Victim Industry: Airlines & Aviation
    Victim Organization: tsunami tsolutions
    Victim Site: tsunamitsolutions.com
  150. Hax.or targets the website of PSG Academy Qatar
    Category: Defacement
    Content: Group claims to have defaced the website of PSG Academy Qatar.
    Date: 2026-03-02T03:56:32Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/128426
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d6545861-6ed7-4520-836e-033487ae28a3.png
    Threat Actors: Hax.or
    Victim Country: Qatar
    Victim Industry: Education
    Victim Organization: psg academy qatar
    Victim Site: register.psgacademy.qa
  151. Alleged data leak of Atlas Air
    Category: Data Breach
    Content: Threat actor claims to have leaked a database of Atlas Air, allegedly containing approximately 1.2 terabytes of compromised data.
    Date: 2026-03-02T03:48:09Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277094/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7b6a156e-9abf-4bcb-b22c-e43a06295ae4.png
    Threat Actors: Everestgroup
    Victim Country: USA
    Victim Industry: Airlines & Aviation
    Victim Organization: atlas air
    Victim Site: atlasair.com
  152. Komiko Suffers Data Breach
    Category: Data Breach
    Content: Komiko, an AI product of Entropia Inc., disclosed a security incident after receiving a credible threat from an external actor claiming unauthorized access to its database. The attacker alleges exfiltration of user IDs, email addresses, and potentially user-generated content, while the company confirmed that passwords and payment card data were not stored in the affected database and therefore were not exposed. Komiko is actively investigating the scope of the breach, the attack vector, and whether AI-generated user content was accessed, has engaged cybersecurity professionals, and reported the matter to law enforcement.
    Date: 2026-03-02T03:39:41Z
    Network: discord
    Published URL: https://discord.com/channels/1251608148649709678/1268101403184992257/1477210764157915136
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a786bbd1-1540-4059-8291-d4a89cebda90.jpg
    Threat Actors: Unknown
    Victim Country: USA
    Victim Industry: Information Technology (IT) Services
    Victim Organization: komiko
    Victim Site: komiko.app
  153. Rayzky_ targets the website of General Maintenance UAE
    Category: Defacement
    Content: The group claims to have defaced the website of General Maintenance UAE.
    Date: 2026-03-02T03:36:24Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41579101?hz=1
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fbe3b181-fb5b-4234-abb6-de0620c4793a.png
    Threat Actors: Rayzky_
    Victim Country: UAE
    Victim Industry: Facilities Services
    Victim Organization: general maintenance uae
    Victim Site: generalmaintenance.ae
  154. Fatimion cyber team claims to target government websites in Kuwait
    Category: Alert
    Content: A recent post by the group claims that they are targeting all government websites in Kuwait.
    Date: 2026-03-02T03:21:01Z
    Network: telegram
    Published URL: https://t.me/hak994/4853
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c8c52118-b0fb-4222-b182-da7b94bfc774.png
    Threat Actors: Fatimion cyber team
    Victim Country: Kuwait
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  155. Alleged sale of unauthorized access to unidentified store
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized access to an unidentified online store in Spain.
    Date: 2026-03-02T03:19:13Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277073/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/433953f0-108a-4e13-990e-baf2d40e5ed6.png
    Threat Actors: ed1n1ca
    Victim Country: Spain
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  156. Alleged unauthorized access to surveillance cameras in USA
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to surveillance cameras in USA.
    Date: 2026-03-02T03:17:08Z
    Network: telegram
    Published URL: https://t.me/zpentestalliance/1113
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5694152a-91a0-45d3-8187-0cde9ab3dd0a.png
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  157. Alleged sale of unauthorized access to unidentified store
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized access to an unidentified online store in France.
    Date: 2026-03-02T02:58:49Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277074/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f388c9ac-e78a-4aea-b983-a164fd014821.png
    Threat Actors: ed1n1ca
    Victim Country: France
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  158. Rayzky_ targets the website of Khunji Group
    Category: Defacement
    Content: The group claims to have defaced the website of Khunji Group, UAE
    Date: 2026-03-02T02:58:30Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41579147
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2bc1c9df-fb4d-4148-a3ba-6529c71ec3c1.png
    Threat Actors: Rayzky_
    Victim Country: UAE
    Victim Industry: Textiles
    Victim Organization: khunji group
    Victim Site: khunjigroup.ae
  159. Alleged data breach of Komiko
    Category: Data Breach
    Content: The threat actor claims to have gained unauthorized access and leaked the data belonging to Komiko. The compromised data includes userid, email address and user generated content.
    Date: 2026-03-02T02:54:05Z
    Network: openweb
    Published URL: https://x.com/troyhunt/status/2028273847376765139
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/bbb07657-386a-4345-b0db-c06f1fc08071.png
    Threat Actors: Komiko-chan
    Victim Country: USA
    Victim Industry: Software
    Victim Organization: komiko
    Victim Site: komiko.ai
  160. Rayzky_ targets the website of Rayyan Water (UAE)
    Category: Defacement
    Content: The group claims to have defaced the website of Rayyan Water, UAE.
    Date: 2026-03-02T02:14:04Z
    Network: openweb
    Published URL: https://zone-h.org/mirror/id/41579315
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/96bf8462-861f-4520-8195-6f934e28be38.png
    https://d34iuop8pidsy8.cloudfront.net/81413b51-b4d8-4faf-aaf0-0cf97a617a8d.png
    Threat Actors: Rayzky_
    Victim Country: UAE
    Victim Industry: Food & Beverages
    Victim Organization: rayyan water
    Victim Site: rayyanwater.ae
  161. Alleged sale of unauthorized access to an unidentified store
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized access to an unidentified online store in France.
    Date: 2026-03-02T02:10:37Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277075/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6867eaf7-20c1-4727-a4af-b5a762061a65.png
    Threat Actors: ed1n1ca
    Victim Country: France
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  162. Alleged sale of unauthorized admin access to unidentified manufacturing organization
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized local admin access to an unidentified manufacturing organization in Brazil.
    Date: 2026-03-02T02:04:19Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277264/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/78bea7eb-cfb1-4d60-bcfe-1db3de9417b5.png
    Threat Actors: Big-Bro
    Victim Country: Brazil
    Victim Industry: Manufacturing
    Victim Organization: Unknown
    Victim Site: Unknown
  163. Alleged unauthorized access to Water Corporation of Odisha
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to Water Corporation of Odisha
    Date: 2026-03-02T02:03:55Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3849
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/52452b2e-fc95-4b60-8dcf-0d0b5649b062.png
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: India
    Victim Industry: Energy & Utilities
    Victim Organization: water corporation of odisha
    Victim Site: watcoodisha.co.in
  164. Alleged sale of unauthorized admin access to unidentified IT company
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized admin access to an unidentified IT company in Brazil.
    Date: 2026-03-02T01:53:08Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277265/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/bfafb4c1-fdf7-4e57-9970-668c3f97ceee.png
    Threat Actors: Big-Bro
    Victim Country: Brazil
    Victim Industry: Information Technology (IT) Services
    Victim Organization: Unknown
    Victim Site: Unknown
  165. Alleged sale of unauthorized admin access to unidentified gift shop
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized admin access to an unidentified gift shop in Spain.
    Date: 2026-03-02T01:48:35Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277271/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a72442c6-6939-4bef-b673-5a919e8c2042.png
    Threat Actors: savel987
    Victim Country: Spain
    Victim Industry: Supermarkets
    Victim Organization: Unknown
    Victim Site: Unknown
  166. Alleged sale of 330 credit card records
    Category: Data Breach
    Content: Threat actor claims to be selling 330 credit card records from USA. The compromised data reportedly includes credit card number, expiry month, expiry year, cvv2, full name, phone number, address, city, state, zip, email, and country.
    Date: 2026-03-02T01:33:59Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277281/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a141f241-244e-45cc-ab7a-4a49f088f7b7.png
    Threat Actors: corptoday
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  167. L4663R666H05T targets the website of Azarim
    Category: Defacement
    Content: The group claims to have defaced the website of Azarim.
    Date: 2026-03-02T01:06:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/795387
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0595ac95-d4b4-4e0d-9a38-fc0e2cbb1755.png
    Threat Actors: L4663R666H05T
    Victim Country: Israel
    Victim Industry: Medical Equipment Manufacturing
    Victim Organization: azarim
    Victim Site: azarimedic.co.il
  168. Alleged Data Breach of SISCONMP
    Category: Data Breach
    Content: The threat actor claims to have breached the database of SISCONMP, the dataset contains personal identification details, license information, and institutional affiliations.
    Date: 2026-03-02T01:05:40Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-SISCONMP-Sistema-de-Informaci%C3%B3n-de-Conductores-que-Transportan-Mercanc%C3%ADas-Peligrosa
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b9911d5d-5a1d-4c5e-a6ac-08b2221711f0.png
    Threat Actors: delitospenales
    Victim Country: Colombia
    Victim Industry: Government Relations
    Victim Organization: sisconmp – information system for drivers transporting dangerous goods
    Victim Site: web.mintransporte.gov.co
  169. chinafans targets the website of DENTIST – Dr.Tal Meir
    Category: Defacement
    Content: The group claims to have defaced the website of DENTIST – Dr.Tal Meir
    Date: 2026-03-02T01:00:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/795807
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/960585ee-0a14-46ee-b096-7c0812e423a6.png
    Threat Actors: chinafans
    Victim Country: Israel
    Victim Industry: Hospital & Health Care
    Victim Organization: dentist – dr.tal meir
    Victim Site: dr-tal.co.il
  170. L4663R666H05T targets the website of Globalonline
    Category: Defacement
    Content: The team claims to have defaced the website of Globalonline.
    Date: 2026-03-02T00:50:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/795386
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9338ace6-6c5b-4df7-b7f4-3edbfd68ad1d.png
    Threat Actors: L4663R666H05T
    Victim Country: Israel
    Victim Industry: Textiles
    Victim Organization: globalonline
    Victim Site: globalonline.co.il
  171. L4663R666H05T targets the website of TREK-ER FORCES
    Category: Defacement
    Content: The Group claims to have defaced the website of TREK-ER FORCES.
    Date: 2026-03-02T00:50:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/795388
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/80cb1024-613d-473e-9d38-3a03573a33a5.png
    Threat Actors: L4663R666H05T
    Victim Country: Israel
    Victim Industry: E-commerce & Online Stores
    Victim Organization: trek-er forces
    Victim Site: trekerforces.co.il
  172. johnfelix777 targets the website of Homekey
    Category: Defacement
    Content: The group claims to have defaced the website of Homekey.
    Date: 2026-03-02T00:45:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/795367
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/018665c6-7aa3-43b6-b1b0-33a713d25a11.png
    Threat Actors: johnfelix777
    Victim Country: Israel
    Victim Industry: Real Estate
    Victim Organization: homekey
    Victim Site: homekey.co.il
  173. Alleged Sale of Unauthorized Access to Unidentified Organization in USA
    Category: Initial Access
    Content: Threat actor claims to be selling access and secret keys to an S3 bucket belonging to a U.S.-based corporation with reported revenue of approximately USD 8 million.
    Date: 2026-03-02T00:20:55Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277314/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/335d2ea4-6977-40af-a965-d579c6a78b9b.png
    Threat Actors: AckLine
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  174. Cyb3r Drag0nz targets the website of maarazplus.co.il
    Category: Defacement
    Content: The group claims to have defaced the website of maarazplus.co.il
    Date: 2026-03-02T00:15:42Z
    Network: telegram
    Published URL: https://t.me/c/3504564040/175
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/73df62d5-6227-49d4-b760-212969de2bb1.png
    Threat Actors: Cyb3r Drag0nz
    Victim Country: Israel
    Victim Industry: Retail Industry
    Victim Organization: Unknown
    Victim Site: maarazplus.co.il