[March-8-2026] Daily Cybersecurity Threat Report

Executive Summary

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data. The data encompasses 88 distinct draft incident reports detected on March 8, 2026. The incidents span a wide array of cyber threats, predominantly featuring data breaches, website defacements, unauthorized initial access sales, and general cyberattack alerts targeting various global entities and governments.

I. Data Breaches and Information Leaks

The most frequent category of incidents in the dataset is data breaches, involving the unauthorized extraction and exposure of sensitive databases, personally identifiable information (PII), and corporate records.

  • Incident 2: US Georgia Driver’s License Database
    • Overview: A threat actor named KYCMyASS claims to be selling scans of United States Georgia driver’s licenses.
    • Data Compromised: The exposed data includes both front and back images of the licenses along with selfie verification photos.
    • Victimology: The targeted country is the USA, though the specific industry and organization remain unknown. The incident was published on the openweb on 2026-03-08T22:33:52Z via darknetarmy.io.
  • Incident 3: Israel’s Ministry of Defense
    • Overview: The 404 CREW CYBER TEAM claims to have breached the database of Israel’s Ministry of Defense.
    • Victimology: The victim is the ministry of defense in Israel, categorized under Government Administration, with the target site being mod.gov.il. The claim was published on Telegram on 2026-03-08T22:13:38Z.
  • Incident 4: Israeli Government Database Leak
    • Overview: The 404 CREW CYBER TEAM claims to have leaked a database allegedly linked to the Israeli government.
    • Data Compromised: The exposed file reportedly contains personal and contact information of government employees, including names, email addresses, and phone numbers.
    • Publication: The incident was posted to Telegram on 2026-03-08T22:12:17Z.
  • Incident 7 & 8: Israel Passports and Mossad Data Leaks
    • Overview: The 404 CREW CYBER TEAM claims to have leaked Israel passports. Separately, the same group claims to have leaked data associated with Mossad.
    • Victimology: Both incidents target Israel, with the Mossad incident targeting the Military Industry via mossad.gov.il. The passport leak was published on 2026-03-08T22:05:45Z, and the Mossad leak on 2026-03-08T21:58:54Z, both on Telegram.
  • Incident 10: Cyprus and Qatar Government Correspondence Leak
    • Overview: The Fatimion cyber team claims to have leaked confidential government documents allegedly related to law enforcement activities and financial supervision.
    • Data Compromised: The exposed material reportedly includes correspondence exchanged between the Cyprus Securities and Exchange Commission (CySEC) and the Economic Crimes Department in Qatar regarding oversight and investigative coordination in a financial fraud case.
    • Victimology: The targeted country is Qatar, within the Government Administration sector. The data was published on Telegram on 2026-03-08T21:15:05Z.
  • Incident 12: Mercedes-Benz Group
    • Overview: A threat actor named xing claims to be selling a customer leads database allegedly sourced from a Mercedes-Benz dealership in California, United States.
    • Data Compromised: The dataset reportedly contains approximately 27,000 unique records described as fresh automotive sales leads. The exposed data may include customer personal information and vehicle-related details, such as full names, addresses, phone numbers, email addresses, vehicle identification numbers (VIN), vehicle make and model, mileage, service history, recall status, warranty information, and dealership staff contact details.
    • Victimology: The target is the mercedes-benz group in the USA Automotive industry, associated with the site mercedes-benz.com, published on the openweb on 2026-03-08T21:07:09Z.
  • Incident 13: Argentine Citizens PII Databases
    • Overview: A threat actor named overtosis4u claims to be selling a large private dataset allegedly containing sensitive personal information of Argentine citizens collected from multiple sectors, including electricity utilities, healthcare systems, and automotive registries.
    • Data Compromised: The database reportedly includes more than 40,000 medical records, 300,000 utility billing records, and 328,000 vehicle registration and ownership records. The dataset contains full personally identifiable information (PII) such as names, DNI numbers, addresses, phone numbers, emails, billing records, and clinical details, along with vehicle ownership information and license plate linkages. The sale was published on the openweb on 2026-03-08T20:52:21Z.
  • Incident 15: RAPiKOM Venezuela
    • Overview: A threat actor named GordonFreeman claims to have leaked a database allegedly belonging to the RAPiKOM Venezuela platform.
    • Data Compromised: The dataset reportedly contains around 5,000 business records associated with companies and affiliates that have used the platform. The exposed data allegedly includes account credentials, bank-related information, phone numbers, email addresses, and geographic location data of businesses.
    • Victimology: The target is rapikom in Venezuela’s E-commerce & Online Stores industry (rapikom.com), published on the openweb on 2026-03-08T20:23:23Z.
  • Incident 16: Canadian Private Leads Database
    • Overview: Threat actor betway claims to be selling a database containing 6.5 million Canadian private leads allegedly collected through advertising campaigns.
    • Data Compromised: The dataset includes client names, phone numbers, email addresses, and country information, indicating potential exposure and distribution of personal contact data. The sale was published on the openweb on 2026-03-08T19:58:11Z.
  • Incident 17: French Boxing Club Database
    • Overview: Threat actor CyberNox claims to have leaked a database containing information related to several boxing clubs in France.
    • Data Compromised: The database includes details such as club names, locations, postal codes, phone numbers, email addresses, and website links. Published on the openweb on 2026-03-08T19:48:00Z.
  • Incident 21: Corporate B2B Email Leads
    • Overview: Threat actor Spectre2Data is selling corporate B2B lead databases and Office365-validated email lists.
    • Data Compromised: It offers millions of business leads, including up to 20–30 million records, with filtered deliverable email addresses for services such as Office365, Gmail (Gsuite), Mimecast, Barracuda, Proofpoint, and others. Published on the openweb on 2026-03-08T17:40:58Z targeting the Marketing, Advertising & Sales industry.
  • Incident 23: Team4Security
    • Overview: Threat actor GhostCrawl claims to have leaked data from Team4Security and shared the first part. Targeting the IT Services industry in Israel (team4security.com), published on the openweb on 2026-03-08T17:34:25Z.
  • Incident 24: Iranian Security Personnel (IRGC)
    • Overview: Threat actor DORNA Iran claims to have released a sample dataset containing information on 240 personnel allegedly affiliated with special security units in Iran, including individuals linked to institutions associated with the Islamic Revolutionary Guard Corps (IRGC). Published on Telegram on 2026-03-08T17:16:28Z targeting the Military Industry.
  • Incident 25: UAE Data Leak
    • Overview: Threat actor Dedale Office claims to have leaked 374.9 MB of data from the UAE. Published on Telegram on 2026-03-08T16:28:53Z.
  • Incident 31 & 32: Baked Games S.A. (Alaska Gold Fever)
    • Overview: Threat actor Angel_Batista claims to have breached and is selling the Unity source code of the upcoming game “Alaska Gold Fever,” allegedly containing 49 GB of data belonging to Baked Games S.A..
    • Victimology: The targeted organization is baked games s.a. (bakedgames.com) in Poland’s Gaming industry. The incidents were published on the openweb on 2026-03-08T14:32:58Z and 2026-03-08T14:30:32Z.
  • Incident 40: Izeta Group
    • Overview: Threat actor macaroni claims to have breached 5,904 records belonging to Izeta Group in Spain (izetagroup.com).
    • Data Compromised: The data reportedly includes customer personal details, contact information, purchase history, and spending records. Published on the openweb on 2026-03-08T14:09:31Z.
  • Incident 41: Le Temps des Cerises Jeans
    • Overview: Threat actor DumpSec claims to be selling 900,000 lines of data from Le Temps des Cerises Jeans in France’s Manufacturing sector (letempsdescerises.com).
    • Data Compromised: The dataset allegedly contains extracted data fields such as order link, gender, customer surname, customer first name, customer email, and more. Published on the openweb on 2026-03-08T14:09:25Z.
  • Incident 42: FNATH
    • Overview: Threat actor Angel_Batista claims to have breached 197 GB of data from FNATH in France’s Non-profit & Social Organizations sector (fnath.org).
    • Data Compromised: The dataset allegedly contains 29,144 + 45,428 records with information such as birth name, email, ID, date of birth, and more. Published on the openweb on 2026-03-08T14:02:10Z.
  • Incident 49: Laika Mascotas
    • Overview: Dedale Office claims to have breached data from Laika Mascotas in Colombia (laika.com.co). Published on Telegram on 2026-03-08T11:56:50Z.
  • Incident 52: Hakara
    • Overview: Threat actor HighRisk claims to have leaked data related to Hakara in Vietnam’s Music industry (hakara.vn). Published on the openweb on 2026-03-08T11:29:14Z.
  • Incident 53: West Kalimantan Provincial Government
    • Overview: Threat actor Shenira6core claims to have leaked the database from the West Kalimantan Provincial Government in Indonesia.
    • Data Compromised: The reportedly data includes personnel records, names, IDs, positions, and department assignments. Published on the openweb on 2026-03-08T11:19:04Z.
  • Incident 55: Sofia Venturini PII Leak
    • Overview: Threat actor dambss claims to have leaked the PII data from Sofia Venturini.
    • Data Compromised: Includes alleged contact details, date of birth, location in Italy, and links to social media profiles. Published on the openweb on 2026-03-08T11:01:00Z.
  • Incident 56: Sagent Pharmaceuticals
    • Overview: Threat actor Worldleaks claims to have breached data from Sagent Pharmaceuticals (USA Healthcare industry, sagentpharma.com) and intends to publish it within 1-2 days. Published on the tor network on 2026-03-08T10:50:19Z.
  • Incident 59: Pakistan Students Database
    • Overview: Threat actor Off-Line claims to have leaked a Pakistani School student database.
    • Data Compromised: The compromised data reportedly includes student names, student IDs, class details, section information, and other academic records. Published on Telegram on 2026-03-08T10:32:37Z.
  • Incident 60: Medihelp Services
    • Overview: Threat actor delitospenales claims to have breached the Medihelp Services database in Mexico’s Healthcare industry (clinicamedihelp.com).
    • Data Compromised: The leaked sample allegedly contains patient-related information such as full names, document details, and medical-related records. Published on the openweb on 2026-03-08T10:32:07Z.
  • Incident 62: WayzeSMS
    • Overview: Threat actor obfuscatable claims to have leaked data advertised as WayzeSMS, in the USA Telecommunications industry (wayzesms.com).
    • Data Compromised: The data reportedly includes WhatsApp, Facebook, Amazon, Instagram, Twitter, and Outlook. Published on the openweb on 2026-03-08T10:20:43Z.
  • Incident 65: IndiHome
    • Overview: Dedale Office claims to have leaked data from IndiHome in Indonesia’s Telecommunications sector (telkomsel.com).
    • Data Compromised: The dataset contains personal details such as names, contact information, and national identity numbers. Published on Telegram on 2026-03-08T09:29:12Z.
  • Incident 68: Denpasar Population Database
    • Overview: Threat actor YanXploit claims to have leaked and shared the Denpasar population database.
    • Data Compromised: The leak reportedly exposes resident demographic records and related personal information from Denpasar, Indonesia. Published on the openweb on 2026-03-08T08:59:52Z.
  • Incident 69: Colombian Vaccination Database
    • Overview: Threat actor ironatlas claims to have breached 223,330 Colombian identification records from a government vaccination website on 19 Feb 2026, reportedly exposing various personal identification details. Published on the openweb on 2026-03-08T08:20:09Z.
  • Incident 71: Airclaim
    • Overview: Threat actor HexDex claims to be selling 121 GB of data from Airclaim in Romania’s Airlines & Aviation sector (airclaim.com).
    • Data Compromised: The dataset allegedly contains information on 55,867 people, including documents such as passports, signatures, boarding passes, and other personal information. Published on the openweb on 2026-03-08T07:43:00Z.
  • Incident 74: IRGC Linked Files Leak
    • Overview: Threat actor Anonymous claims to have leaked files related to the Islamic Revolutionary Guard Corps (IRGC) in Iran.
    • Data Compromised: The information allegedly exposes individuals linked to IRGC operations. Published on Telegram on 2026-03-08T06:34:18Z.
  • Incident 77: French Driving School Data
    • Overview: Threat actor telaviv claims to be selling the database of a French driving school system.
    • Data Compromised: The database contains personal documents and identification records. Published on the openweb on 2026-03-08T06:22:24Z.
  • Incident 78: Dinas Kependudukan dan Pencatatan Sipil Provinsi DKI Jakarta
    • Overview: Dedale Office claims to have breached 539,737 Rows of data from this Indonesian Government Administration entity. Published on Telegram on 2026-03-08T06:16:52Z.
  • Incident 79: Pakistan Government Personnel Information
    • Overview: Dedale Office claims to have leaked 2GB of data from the Pakistan Government.
    • Data Compromised: The compromised data reportedly includes Department, Name, Address, Date of Birth, Blood Group, Email, Government ID and ID Photos. Published on Telegram on 2026-03-08T05:46:41Z.
  • Incident 85: Municipal Government of Juárez
    • Overview: Threat actor godislife69x claims to have breached the database of the Government of Juárez, Nuevo León, Mexico (soyjuarense.juarez-nl.gob.mx).
    • Data Compromised: The dataset contains personal information, identification numbers, and administrative records associated with the Juárez municipal government platforms. Published on the openweb on 2026-03-08T02:27:56Z.
  • Incident 87: Space42 Data Breach
    • Overview: Space42 (UAE Defense & Space sector, space42.ai) was reportedly subjected to a data breach by a hacker group named Mobir.
    • Details: The attack targeted Space42’s network in response to alleged cooperation between the company and Israeli and U.S. entities. Mobir stated that it gained access to internal systems and published screenshots of server management dashboards as evidence of the breach. The group also claimed to have leaked documents related to contracts between Yahsat—one of the companies that merged to form Space42—and the Israeli satellite communications company Gilat. Published on Telegram on 2026-03-08T00:10:03Z.
  • Incident 88: Instituto Técnico Superior
    • Overview: Threat actor Tanaka claims to have breached the database of Instituto Técnico Superior – MEC in Paraguay’s Education sector (caeff.com.py).
    • Data Compromised: The dataset contains students’ personal information. Published on the openweb on 2026-03-08T00:02:45Z.

II. Website Defacements

Website defacements form another significant portion of the incidents, predominantly carried out by hacktivist groups seeking to alter the visual appearance of a site to display a message.

  • Incident 1: Kurdistan Commando Force
    • Overview: The 313 Team claims to have defaced the official website of the Kurdistan Commando Force in Iraq (cdokurd.com). Published on Telegram on 2026-03-08T23:46:45Z.
  • Incident 28: Luachnet
    • Overview: The group Z-BL4CX-H4T claims to have defaced the website of Luachnet in Israel’s Online Publishing sector (luachnet.co.il). Published on Telegram on 2026-03-08T15:33:10Z.
  • Incident 33: Felicity Insurance
    • Overview: Z-BL4CX-H4T claims to have defaced the website of Felicity Insurance in the USA (felicityinsure.com). Published on Telegram on 2026-03-08T14:28:12Z.
  • Incident 34: Eagle First
    • Overview: Z-BL4CX-H4T claims to have defaced the website of Eagle First in the USA Accounting industry (eagletaxpros.com). Published on Telegram on 2026-03-08T14:23:18Z.
  • Incident 36: Simple Registration Solutions
    • Overview: Z-BL4CX-H4T claims to have defaced the website of Simple Registration Solutions in the USA IT Services sector (simpletoregister.com). Published on Telegram on 2026-03-08T14:18:32Z.
  • Incident 38: Culturevore
    • Overview: The DEFACER INDONESIAN TEAM claims to have defaced the website of Culturevore in the USA Philanthropy sector (culturevore.com). Published on Telegram on 2026-03-08T14:11:45Z.
  • Incident 43: Casino4Live
    • Overview: INDOHAXSEC claims to have defaced the website of Casino4Live in Costa Rica’s Gambling industry (casino4live.com). Published on Telegram on 2026-03-08T13:54:25Z.
  • Incident 45: Party42nite
    • Overview: The DEFACER INDONESIAN TEAM claims to have defaced the website of Party42nite in South Africa’s Information Services industry (party42nite.com). Published on Telegram on 2026-03-08T13:33:58Z.
  • Incident 46: Full Before Montauk
    • Overview: The DEFACER INDONESIAN TEAM claims to have defaced the website of Full Before Montauk in the USA Online Publishing sector (fullbeforemontauk.com). Published on Telegram on 2026-03-08T13:22:17Z.
  • Incident 47: Alrama Films
    • Overview: Threat actor L4663R666H05T claims to have defaced the website of Alrama Films in the UAE Automotive industry (alramafilms.ae). Published on the openweb on 2026-03-08T12:34:18Z.
  • Incident 48: Dinas PUPR Provinsi Sumatera Utara
    • Overview: The group Hax.or claims to have defaced the website of Dinas PUPR Provinsi Sumatera Utara in Indonesia’s Government Administration sector (dpupr.sumutprov.go.id). Published on Telegram on 2026-03-08T12:12:58Z.
  • Incident 54: DILIGENT SEARCHES REALTY LLC
    • Overview: The DEFACER INDONESIAN TEAM claims to have defaced the website of DILIGENT SEARCHES REALTY LLC in the USA Real Estate industry (diligentsearches.com). Published on Telegram on 2026-03-08T11:07:54Z.
  • Incident 57: Grand Elm
    • Overview: The DEFACER INDONESIAN TEAM claims to have defaced the website of Grand Elm in the USA Real Estate industry (grandelm.com). Published on Telegram on 2026-03-08T10:50:15Z.
  • Incident 58: Ministry of Industry Thailand
    • Overview: Nullsec Philippines claims to have defaced the website of the Ministry of Industry in Thailand (pdg.industry.go.th). Published on Telegram on 2026-03-08T10:34:02Z.
  • Incident 66: IKIP PGRI Bojonegoro Library
    • Overview: Hax.or claims to have defaced the website of IKIP PGRI Bojonegoro Library in Indonesia (smartlab.ikippgribojonegoro.ac.id). Published on Telegram on 2026-03-08T09:14:43Z.
  • Incident 67: IKIP PGRI Bojonegoro
    • Overview: Hax.or claims to have defaced the website of IKIP PGRI Bojonegoro in Indonesia’s Education sector (sim-asset.ikippgribojonegoro.ac.id). Published on Telegram on 2026-03-08T09:04:33Z.
  • Incident 82: AvalAi
    • Overview: The group r0ckin targets the website of AvalAi in Iran’s IT Services sector (avalai.ir). Published on the openweb on 2026-03-08T03:39:10Z.
  • Incident 84: AsnaFlenjan
    • Overview: The group /Rayzky_ claims to have defaced the website of AsnaFlenjan in Iran’s Law Practice sector (asnaflenjan.ir). Published on the openweb on 2026-03-08T03:30:22Z.

III. Initial Access Sales and Compromises

Initial Access brokers actively compromise networks and sell their access points to other threat actors. This dataset highlights numerous high-level access claims.

  • Incident 6: Unauthorized AWS Access in Canada
    • Overview: Threat actor williamblack claims to be selling unauthorized access to an AWS environment associated with a Canadian domain, reportedly accessible via SSH and AWS keys.
    • Target Details: The compromised environment is linked to an organization operating in the Industrial IoT, Automated AI, and Software Development sectors. Published on the openweb on 2026-03-08T22:08:43Z.
  • Incident 14: Industrial Control System (ICS) Access
    • Overview: Threat group MAD GHOST claims to have gained unauthorized access to an Industrial Control System (ICS) interface.
    • Target Details: The group allegedly obtained full control over system operations including heater, ventilation, temperature monitoring, and remote system controls. The victim is located in Israel. Published on Telegram on 2026-03-08T20:35:50Z.
  • Incident 26: CCTV Camera Access in Israel
    • Overview: The Team Bangladesh cyber squad claims to have gained unauthorized access to an unidentified D-Link CCTV camera in Israel. Published on Telegram on 2026-03-08T15:58:44Z.
  • Incident 27: WordPress Shop Admin Access in UK
    • Overview: Threat actor Shopify claims to be selling unauthorized admin access to a WordPress-based online shop located in the United Kingdom.
    • Target Details: The access allegedly provides full administrative privileges and the ability to interact with the payment form, indicating potential control over the store’s transactions and order management system. Published on the openweb on 2026-03-08T15:33:53Z.
  • Incident 37: Israeli Android TVs Access
    • Overview: The Team Bangladesh cyber squad claims to have gained unauthorized access to multiple Android TV devices located in Israel, allegedly compromising more than eight devices. Published on Telegram on 2026-03-08T14:14:06Z.
  • Incident 39: PGK Gallery Admin Access
    • Overview: The group SILENT ERROR SYSTEM claims to have leaked admin login credentials of PGK Gallery in Indonesia’s Retail Industry (pgkgallery.com). Published on Telegram on 2026-03-08T14:11:11Z.
  • Incident 44: Access to 700+ Compromised PCs
    • Overview: Threat actor francogambino83 claims to have access to more than 700 compromised PCs, stating that the number of infected systems is increasing daily. Published on the openweb on 2026-03-08T13:54:01Z.
  • Incident 50: Open UPS Access
    • Overview: Threat actor networkbase claims to be offering access to multiple Open UPS systems, including both newly discovered and previously known accesses. Published on the openweb on 2026-03-08T11:33:10Z.
  • Incident 51: ADFS & WHMCS Access Credentials
    • Overview: Threat actor 3olotoi claims to possess approximately 2,700 ADFS and WHMCS access credentials allegedly obtained from various domains.
    • Target Details: The actor states that each domain is unique and claims that more than 80% of the accesses are valid. The post suggests that these accesses were previously observed being sold in auctions a few months ago. Published on the openweb on 2026-03-08T11:31:41Z.
  • Incident 61: Computer Source Bangladesh Admin Access
    • Overview: The group Off-Line claims to have leaked admin login credentials belonging to Computer Source Bangladesh in the IT Services industry (computersource.com.bd). Published on Telegram on 2026-03-08T10:20:48Z.
  • Incident 75: Coffee Shop Admin/Shell Access in Germany
    • Overview: Threat actor Zimmer claims to be selling unauthorized admin and shell access to an unidentified coffee shop in Germany. Published on the openweb on 2026-03-08T06:32:31Z.
  • Incident 76: Magento Accesses
    • Overview: Threat actor Bakardi claims to be selling 500 unauthorized Magento accesses in multiple countries, targeting E-commerce & Online Stores. Published on the openweb on 2026-03-08T06:30:15Z.
  • Incident 80: Argentine Judiciary Admin Panel Access
    • Overview: Threat actor ORION claims to have access to an administrative panel linked to the Argentine Judicial Branch.
    • Target Details: The panel allegedly contains sensitive information related to prosecutors and applicants for government positions. Published on the openweb on 2026-03-08T03:56:21Z.
  • Incident 81: SCADA System Access in Ukraine
    • Overview: The group OverFlame claims to have gained unauthorized access to a SCADA system in Ukraine. Published on Telegram on 2026-03-08T03:45:53Z.

IV. Cyberattacks, Malware, and Active Alerts

Several incidents involve direct cyberattacks (like DDoS or infrastructure disruption), malware sales, or generalized threat alerts indicating impending or ongoing operations against national interests or broad geographic regions.

  • Incident 5: IP Cameras Across Israel and Gulf Countries Targeted
    • Overview: Hacktivist led cyberattacks targeting internet connected IP cameras have been observed across Israel and several Gulf countries, including the UAE, Qatar, Bahrain, Kuwait, as well as Lebanon and Cyprus.
    • Tactics: The attackers reportedly used VPN and VPS infrastructure to scan for and identify vulnerable devices across the region. Published on the openweb on 2026-03-08T22:10:58Z.
  • Incident 9: Keymous Plus targets energy servers
    • Overview: A recent post by Keymous Plus indicates that they are targeting unidentified energy servers. Published on Telegram on 2026-03-08T21:17:04Z.
  • Incident 11: Fatimion Cyber Team Targets Qatari Ministry of Interior
    • Overview: A recent post by the Fatimion cyber team indicates that they are targeting the Electronic Crimes Section in the Qatari Ministry of Interior. Published on Telegram on 2026-03-08T21:13:38Z.
  • Incident 18: BROTHERHOOD CAPUNG INDONESIA targets Leona Raíces
    • Overview: A post indicates they are targetting Leona Raíces in Costa Rica’s Real Estate sector (leonaraices.com). Published on Telegram on 2026-03-08T19:47:46Z.
  • Incident 19: Sale of Silver Stealer Malware
    • Overview: Threat actor SilverSupport is advertising a malware tool called Silver Stealer.
    • Capabilities: The malware is designed to steal browser data and cookies from browsers such as Google Chrome, Microsoft Edge, Opera, Opera GX, and Mozilla Firefox. Published on the openweb on 2026-03-08T18:52:09Z.
  • Incident 20: 313 Team targets Kuwait Servers
    • Overview: A post from the 313 Team claims they are targeting all of Kuwait Servers, specifically mentioning the kuwaiti ministry of defense. Published on Telegram on 2026-03-08T18:18:57Z.
  • Incident 22: LAPSUS Targets TAJ
    • Overview: The group LAPSUS claims to be selling software tools and configuration files allegedly required to access a “TAJ” database, rather than the database itself.
    • Tactics: The post states that sample materials, including certificates and tutorials, have been shared to demonstrate access capabilities. Published on Telegram on 2026-03-08T17:35:47Z.
  • Incident 29: Cardinal Alert
    • Overview: The group Cardinal indicates they are targeting an unidentified organisation. Published on Telegram on 2026-03-08T15:27:09Z.
  • Incident 30: AnonGhost Targets Israel and USA
    • Overview: A post by AnonGhost indicates infiltration of multiple digital systems in the United States and Israel, alleging access to SCADA environments, surveillance cameras, broadcast networks, and other critical infrastructure platforms.
    • Capabilities: The group claims the capability to disrupt utilities such as water, power, and emergency communications systems, while also asserting extensive network reconnaissance across millions of IP addresses. Published on Telegram on 2026-03-08T14:45:35Z.
  • Incident 35: Sale of Microsoft Office Cookie Scampage Tool (XCode)
    • Overview: Threat actor HeizTs claims to be selling a Microsoft Office cookie scampage tool called XCode.
    • Capabilities: It is allegedly capable of harvesting Microsoft Office account session cookies, including accounts protected with 2FA. The tool reportedly supports hosting via cPanel or AAPanel, includes anti-bot and VPN protection, and provides visit protection. Target is microsoft (microsoft.com). Published on the openweb on 2026-03-08T14:22:27Z.
  • Incident 63: THE GARUDA EYE targets Egypt
    • Overview: A recent post indicates they are targeting Egypt. Published on Telegram on 2026-03-08T10:19:47Z.
  • Incident 64: Cyberattack on Israeli Weather Station Infrastructures
    • Overview: Handala Hack claims responsibility for conducting a cyberattack and breaching the main servers of Israeli weather station infrastructure. Published on Telegram on 2026-03-08T09:54:33Z.
  • Incident 70: Cyberattack Hit Middlesex-London Health Unit
    • Overview: A cybersecurity incident affected the Middlesex-London Health Unit in London (Canada), forcing the organization to shut down some phone lines and internal software systems as a precaution.
    • Response: The health unit reported the incident to the privacy commissioner and the Ministry of Health while an investigation was launched to determine the cause and scope of the attack. Officials stated that certain services were temporarily disrupted while technical teams worked to secure the network and restore systems. At the time of reporting, authorities had not confirmed whether any sensitive data had been compromised. Published on the openweb on 2026-03-08T07:46:22Z via cbc.ca.
  • Incident 72: Cyberattack on Surveillance Cameras in Tel Aviv and Haifa
    • Overview: UniT 313 claims to have targeted surveillance camera systems in Tel Aviv and Haifa, Israel, alleging that the cameras were disrupted and taken out of service during the operation. Published on Telegram on 2026-03-08T07:28:29Z.
  • Incident 73: UniT 313 targets Israel
    • Overview: An alert from UniT 313 indicating they are targeting Israel. Published on Telegram on 2026-03-08T07:14:26Z.
  • Incident 83: DieNet targets USA
    • Overview: A recent post by DieNet indicates that they are targeting the USA. Published on Telegram on 2026-03-08T03:30:25Z.
  • Incident 86: DieNet targets Kuwait and Other Gulf States
    • Overview: DieNet indicates that they are targeting Digital Systems in Kuwait and Other Gulf States. Published on Telegram on 2026-03-08T01:56:17Z.

Conclusion

The cyber threat landscape on March 8, 2026, as detailed by the 88 draft incidents, highlights a highly active and geographically diverse series of attacks. Israel and the USA were frequently targeted by both state-aligned hacktivists and financially motivated threat actors, experiencing data leaks (including government and defense data), critical infrastructure probing, and website defacements. The proliferation of unauthorized accesses sold on dark web and open web forums indicates a sustained threat of secondary attacks such as ransomware or deeper network espionage. The utilization of Telegram as an announcement and data distribution platform remains a dominant trend for threat actors claiming responsibility for operations ranging from defacements to massive PII leaks.

Detected Incidents Draft Data

  1. 313 Team targets the official website of Kurdistan Commando Force
    Category: Defacement
    Content: Group claims to have defaced the official website of Kurdistan Commando Force.
    Date: 2026-03-08T23:46:45Z
    Network: telegram
    Published URL: https://t.me/xX313XxTeam/686
    Screenshots:
    None
    Threat Actors: 313 Team
    Victim Country: Iraq
    Victim Industry: Military Industry
    Victim Organization: kurdistan commando force
    Victim Site: cdokurd.com
  2. Alleged Sale of US Georgia Driver’s License Database
    Category: Data Breach
    Content: Threat Actor claims to be selling scans of United States Georgia driver’s licenses, including both front and back images along with selfie verification photos.
    Date: 2026-03-08T22:33:52Z
    Network: openweb
    Published URL: https://darknetarmy.io/threads/%F0%9F%87%BA%F0%9F%87%B8-georgia-dl-front-back-selfie.80238/
    Screenshots:
    None
    Threat Actors: KYCMyASS
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  3. Alleged data breach of Israels Ministry of Defense
    Category: Data Breach
    Content: The group claims to have breached database of Israels Ministry of Defense.
    Date: 2026-03-08T22:13:38Z
    Network: telegram
    Published URL: https://t.me/crewcyber/953
    Screenshots:
    None
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: Israel
    Victim Industry: Government Administration
    Victim Organization: ministry of defense
    Victim Site: mod.gov.il
  4. Alleged Data Leak of Israeli Government Database
    Category: Data Breach
    Content: A threat group claims to have leaked a database allegedly linked to the Israeli government. The exposed file reportedly contains personal and contact information of government employees, including names, email addresses, and phone numbers.
    Date: 2026-03-08T22:12:17Z
    Network: telegram
    Published URL: https://t.me/crewcyber/954
    Screenshots:
    None
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  5. IP Cameras Across Israel and Gulf Countries Targeted in Cyberattacks
    Category: Cyber Attack
    Content: Hacktivist led cyberattacks targeting internet connected IP cameras have been observed across Israel and several Gulf countries, including the UAE, Qatar, Bahrain, Kuwait, as well as Lebanon and Cyprus. The attackers reportedly used VPN and VPS infrastructure to scan for and identify vulnerable devices across the region.
    Date: 2026-03-08T22:10:58Z
    Network: openweb
    Published URL: https://securityaffairs.com/189069/cyber-warfare-2/iran-linked-hackers-target-ip-cameras-across-israel-and-gulf-states-for-military-intelligence.html
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  6. Alleged Sale of Unauthorized AWS Access via SSH to Multiple Organizations in Canada
    Category: Initial Access
    Content: Threat Actor claims to be selling unauthorized access to an AWS environment associated with a Canadian domain, reportedly accessible via SSH and AWS keys. The compromised environment is linked to an organization operating in the Industrial IoT, Automated AI, and Software Development sectors.
    Date: 2026-03-08T22:08:43Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277842/
    Screenshots:
    None
    Threat Actors: williamblack
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. Alleged data leak of israel passports
    Category: Data Breach
    Content: The group claims to have leaked israel passports.
    Date: 2026-03-08T22:05:45Z
    Network: telegram
    Published URL: https://t.me/crewcyber/952
    Screenshots:
    None
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  8. Alleged data leak of Mossad
    Category: Data Breach
    Content: The group claims to have leaked data associated with Mossad.
    Date: 2026-03-08T21:58:54Z
    Network: telegram
    Published URL: https://t.me/crewcyber/951
    Screenshots:
    None
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: Israel
    Victim Industry: Military Industry
    Victim Organization: mossad
    Victim Site: mossad.gov.il
  9. Keymous Plus claims to target energy servers
    Category: Alert
    Content: A recent post by the group indicates that they are targeting unidentified energy servers.
    Date: 2026-03-08T21:17:04Z
    Network: telegram
    Published URL: https://t.me/KeymousTG/867
    Screenshots:
    None
    Threat Actors: Keymous Plus
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Alleged Leak of Confidential Government Correspondence Related to Law Enforcement and Financial Supervision
    Category: Data Breach
    Content: The threat group claims to have leaked confidential government documents allegedly related to law enforcement activities and financial supervision. The exposed material reportedly includes correspondence exchanged between the Cyprus Securities and Exchange Commission (CySEC) and the Economic Crimes Department in Qatar regarding oversight and investigative coordination in a financial fraud case.
    Date: 2026-03-08T21:15:05Z
    Network: telegram
    Published URL: https://t.me/hak994/5108
    Screenshots:
    None
    Threat Actors: Fatimion cyber team
    Victim Country: Qatar
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  11. Fatimion cyber team claims to target Electronic Crimes Section in the Qatari Ministry of Interior
    Category: Alert
    Content: A recent post by the group indicates that they are targeting Electronic Crimes Section in the Qatari Ministry of Interior.
    Date: 2026-03-08T21:13:38Z
    Network: telegram
    Published URL: https://t.me/hak994/5106
    Screenshots:
    None
    Threat Actors: Fatimion cyber team
    Victim Country: Qatar
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  12. Alleged data breach of Mercedes-Benz Group
    Category: Data Breach
    Content: The threat actor claims to be selling a customer leads database allegedly sourced from a Mercedes-Benz dealership in California, United States. the dataset reportedly contains approximately 27,000 unique records described as fresh automotive sales leads.the exposed data may include customer personal information and vehicle-related details, such as full names, addresses, phone numbers, email addresses, vehicle identification numbers (VIN), vehicle make and model, mileage, service history, recall status, warranty information, and dealership staff contact details.
    Date: 2026-03-08T21:07:09Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Mercedes-Benz-2026
    Screenshots:
    None
    Threat Actors: xing
    Victim Country: USA
    Victim Industry: Automotive
    Victim Organization: mercedes-benz group
    Victim Site: mercedes-benz.com
  13. Alleged Sale of Citizens PII Databases Across Multiple Sectors in Argentina
    Category: Data Breach
    Content: Threat Actor claims to be selling a large private dataset allegedly containing sensitive personal information of Argentine citizens collected from multiple sectors, including electricity utilities, healthcare systems, and automotive registries. The database reportedly includes more than 40,000 medical records, 300,000 utility billing records, and 328,000 vehicle registration and ownership records. The dataset contains full personally identifiable information (PII) such as names, DNI numbers, addresses, phone numbers, emails, billing records, and clinical details, along with vehicle ownership information and license plate linkages.
    Date: 2026-03-08T20:52:21Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277838/
    Screenshots:
    None
    Threat Actors: overtosis4u
    Victim Country: Argentina
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  14. Alleged Unauthorized Access to Industrial Control System (ICS)
    Category: Initial Access
    Content: Threat group claims to have gained unauthorized access to an Industrial Control System (ICS) interface, allegedly obtaining full control over system operations including heater, ventilation, temperature monitoring, and remote system controls.
    Date: 2026-03-08T20:35:50Z
    Network: telegram
    Published URL: https://t.me/ARABIAN_GHOSTS/1849
    Screenshots:
    None
    Threat Actors: MAD GHOST
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  15. Alleged data breach of Rapikom
    Category: Data Breach
    Content: The threat actor claims to have leaked a database allegedly belonging to the RAPiKOM Venezuela platform. the dataset reportedly contains around 5,000 business records associated with companies and affiliates that have used the platform.The exposed data allegedly includes account credentials, bank-related information, phone numbers, email addresses, and geographic location data of businesses. .
    Date: 2026-03-08T20:23:23Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-FREE-RAPIKOM-Venezuela-DB-5K-business-records-bank-accounts-phone-numbers-emails
    Screenshots:
    None
    Threat Actors: GordonFreeman
    Victim Country: Venezuela
    Victim Industry: E-commerce & Online Stores
    Victim Organization: rapikom
    Victim Site: rapikom.com
  16. Alleged Sale of 6.5 Million Canadian Private Leads Database
    Category: Data Breach
    Content: Threat Actor claims to be selling a database containing 6.5 million Canadian private leads allegedly collected through advertising campaigns. The dataset includes client names, phone numbers, email addresses, and country information, indicating potential exposure and distribution of personal contact data.
    Date: 2026-03-08T19:58:11Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277828/
    Screenshots:
    None
    Threat Actors: betway
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  17. Alleged Leak of French Boxing Club Information Database
    Category: Data Breach
    Content: A threat actor claims to have leaked a database containing information related to several boxing clubs in France. which includes details such as club names, locations, postal codes, phone numbers, email addresses, and website links.
    Date: 2026-03-08T19:48:00Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-FR-Liste-club-boxing
    Screenshots:
    None
    Threat Actors: CyberNox
    Victim Country: France
    Victim Industry: Sports
    Victim Organization: Unknown
    Victim Site: Unknown
  18. BROTHERHOOD CAPUNG INDONESIA claims to target Leona Raíces
    Category: Alert
    Content: A recent post by the group indicates that they are targetting Leona Raíces.
    Date: 2026-03-08T19:47:46Z
    Network: telegram
    Published URL: https://t.me/c/3800744258/50
    Screenshots:
    None
    Threat Actors: BROTHERHOOD CAPUNG INDONESIA
    Victim Country: Costa Rica
    Victim Industry: Real Estate
    Victim Organization: leona raíces
    Victim Site: leonaraices.com
  19. Alleged sale of Silver Stealer
    Category: Malware
    Content: A threat actor is advertising a malware tool called Silver Stealer .The malware is designed to steal browser data and cookies from browsers such as Google Chrome, Microsoft Edge, Opera, Opera GX, and Mozilla Firefox.
    Date: 2026-03-08T18:52:09Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Silver-Stealer
    Screenshots:
    None
    Threat Actors: SilverSupport
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  20. 313 Team claims to target all of Kuwait Servers
    Category: Alert
    Content: A recent post from the group claims that they are targeting all of Kuwait Servers.
    Date: 2026-03-08T18:18:57Z
    Network: telegram
    Published URL: https://t.me/xX313XxTeam/684
    Screenshots:
    None
    Threat Actors: 313 Team
    Victim Country: Kuwait
    Victim Industry: Unknown
    Victim Organization: kuwaiti ministry of defense
    Victim Site: Unknown
  21. Alleged Sale of Corporate B2B Email Leads and Office365-Validated Databases
    Category: Data Breach
    Content: The threat actor selling corporate B2B lead databases and Office365-validated email lists. It offers millions of business leads, including up to 20–30 million records, with filtered deliverable email addresses for services such as Office365, Gmail (Gsuite), Mimecast, Barracuda, Proofpoint, and others.
    Date: 2026-03-08T17:40:58Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-Sell-Leads-sorter-for-OFFICE365-Valid-Deliverable-and-others-webmails
    Screenshots:
    None
    Threat Actors: Spectre2Data
    Victim Country: Unknown
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: Unknown
    Victim Site: Unknown
  22. LAPSUS claims to target TAJ
    Category: Alert
    Content: The group claims to be selling software tools and configuration files allegedly required to access a “TAJ” database, rather than the database itself. The post states that sample materials, including certificates and tutorials, have been shared to demonstrate access capabilities.
    Date: 2026-03-08T17:35:47Z
    Network: telegram
    Published URL: https://t.me/group_LAPSUS/33
    Screenshots:
    None
    Threat Actors: LAPSUS
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  23. Alleged data breach of Team4Security
    Category: Data Breach
    Content: The threat actor claims to have leaked data from Team4Security and shared the first part.
    Date: 2026-03-08T17:34:25Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-team4security-com-Data-Breach-PART-1-Download
    Screenshots:
    None
    Threat Actors: GhostCrawl
    Victim Country: Israel
    Victim Industry: Information Technology (IT) Services
    Victim Organization: team4security
    Victim Site: team4security.com
  24. Alleged data leak of Iranian Security Personnel from Special Unit
    Category: Data Breach
    Content: The group claims to have released a sample dataset containing information on 240 personnel allegedly affiliated with special security units in Iran, including individuals linked to institutions associated with the Islamic Revolutionary Guard Corps (IRGC).
    Date: 2026-03-08T17:16:28Z
    Network: telegram
    Published URL: https://t.me/dornairan_en/125
    Screenshots:
    None
    Threat Actors: DORNA Iran
    Victim Country: Iran
    Victim Industry: Military Industry
    Victim Organization: islamic revolutionary guard corps
    Victim Site: Unknown
  25. Alleged leak of UAE data
    Category: Data Breach
    Content: The group claims to have leaked 374.9 MB of data from UAE.
    Date: 2026-03-08T16:28:53Z
    Network: telegram
    Published URL: https://t.me/DedaleOffice/534
    Screenshots:
    None
    Threat Actors: Dedale Office
    Victim Country: UAE
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  26. Alleged unauthorized access to an unidentified CCTV camera in Israel
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to unidentified D-Link CCTV camera in Israel/
    Date: 2026-03-08T15:58:44Z
    Network: telegram
    Published URL: https://t.me/teambcs404/346
    Screenshots:
    None
    Threat Actors: Team Bangladesh cyber squad
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  27. Alleged Sale of Unauthorized Admin Access to a WordPress Shop in UK
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized admin access to a WordPress-based online shop located in the United Kingdom, allegedly providing full administrative privileges and the ability to interact with the payment form, indicating potential control over the store’s transactions and order management system.
    Date: 2026-03-08T15:33:53Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277819/
    Screenshots:
    None
    Threat Actors: Shopify
    Victim Country: UK
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  28. Z-BL4CX-H4T targets the website of Luachnet
    Category: Defacement
    Content: The group claims to have defaced the website of Luachnet.
    Date: 2026-03-08T15:33:10Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/440
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Israel
    Victim Industry: Online Publishing
    Victim Organization: luachnet
    Victim Site: luachnet.co.il
  29. Cardinal claims to target an unidentified organisation
    Category: Alert
    Content: A recent post by the group indicates that they are targeting an unidentified organisation.
    Date: 2026-03-08T15:27:09Z
    Network: telegram
    Published URL: https://t.me/c/2869875394/346
    Screenshots:
    None
    Threat Actors: Cardinal
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  30. AnonGhost claims to target Israel and USA
    Category: Alert
    Content: A recent post by the group indicates infiltration of multiple digital systems in the United States and Israel, alleging access to SCADA environments, surveillance cameras, broadcast networks, and other critical infrastructure platforms. The group claims the capability to disrupt utilities such as water, power, and emergency communications systems, while also asserting extensive network reconnaissance across millions of IP addresses.
    Date: 2026-03-08T14:45:35Z
    Network: telegram
    Published URL: https://t.me/c/1806562122/14377
    Screenshots:
    None
    Threat Actors: AnonGhost
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Alleged Sale of Alaska Gold Fever Game Source Code from Baked Games S.A.
    Category: Data Breach
    Content: The threat actor claims to be selling the Unity source code of the upcoming game “Alaska Gold Fever,” allegedly containing 49 GB of data belonging to Baked Games S.A..
    Date: 2026-03-08T14:32:58Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Alaska-Gold-Fever-Source-Code-unreleased-game
    Screenshots:
    None
    Threat Actors: Angel_Batista
    Victim Country: Poland
    Victim Industry: Gaming
    Victim Organization: baked games s.a.
    Victim Site: bakedgames.com
  32. Alleged data breach of Baked Games S.A.
    Category: Data Breach
    Content: The threat actor claims to have breached the Unity source code of the upcoming game Alaska Gold Fever, allegedly containing 49 GB of data from Baked Games S.A.
    Date: 2026-03-08T14:30:32Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Alaska-Gold-Fever-Source-Code-unreleased-game
    Screenshots:
    None
    Threat Actors: Angel_Batista
    Victim Country: Poland
    Victim Industry: Gaming
    Victim Organization: baked games s.a.
    Victim Site: bakedgames.com
  33. Z-BL4CX-H4T targets the website of Felicity Insurance
    Category: Defacement
    Content: The group claims to have defaced the website of Felicity Insurance.
    Date: 2026-03-08T14:28:12Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/439
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: USA
    Victim Industry: Insurance
    Victim Organization: felicity insurance
    Victim Site: felicityinsure.com
  34. Z-BL4CX-H4T targets the website of Eagle First
    Category: Defacement
    Content: The group claims to have defaced the website of Eagle First.
    Date: 2026-03-08T14:23:18Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/439
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: USA
    Victim Industry: Accounting
    Victim Organization: eagle first
    Victim Site: eagletaxpros.com
  35. Alleged sale of Microsoft Office cookie scampage tool XCode
    Category: Malware
    Content: The threat actor claims to be selling a Microsoft Office cookie scampage tool called XCode, allegedly capable of harvesting Microsoft Office account session cookies, including accounts protected with 2FA. The tool reportedly supports hosting via cPanel or AAPanel, includes anti-bot and VPN protection, provides visit protection
    Date: 2026-03-08T14:22:27Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-XCode-Microsoft-Office-Cooke-Scampage
    Screenshots:
    None
    Threat Actors: HeizTs
    Victim Country: USA
    Victim Industry: Software Development
    Victim Organization: microsoft
    Victim Site: microsoft.com
  36. Z-BL4CX-H4T targets the website of Simple Registration Solutions
    Category: Defacement
    Content: The group claims to have defaced the website of Simple Registration Solutions.
    Date: 2026-03-08T14:18:32Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/439
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: USA
    Victim Industry: Information Technology (IT) Services
    Victim Organization: simple registration solutions
    Victim Site: simpletoregister.com
  37. Alleged unauthorized access to multiple Israeli Android TVs
    Category: Initial Access
    Content: The threat actor claims to have gained unauthorized access to multiple Android TV devices located in Israel, allegedly compromising more than eight devices.
    Date: 2026-03-08T14:14:06Z
    Network: telegram
    Published URL: https://t.me/teambcs404/345
    Screenshots:
    None
    Threat Actors: Team Bangladesh cyber squad
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  38. DEFACER INDONESIAN TEAM targets the website of Culturevore
    Category: Defacement
    Content: The group claims to have defaced the website of Culturevore.
    Date: 2026-03-08T14:11:45Z
    Network: telegram
    Published URL: https://t.me/c/2433981896/1204
    Screenshots:
    None
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: USA
    Victim Industry: Philanthropy
    Victim Organization: culturevore
    Victim Site: culturevore.com
  39. Alleged leak of admin access to PGK Gallery
    Category: Initial Access
    Content: The group claims to have leaked admin login credentials of PGK Gallery.
    Date: 2026-03-08T14:11:11Z
    Network: telegram
    Published URL: https://t.me/silenterrorsystem/120
    Screenshots:
    None
    Threat Actors: SILENT ERROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Retail Industry
    Victim Organization: pgk gallery
    Victim Site: pgkgallery.com
  40. Alleged data breach of Izeta Group
    Category: Data Breach
    Content: The threat actor claims to be breached 5,904 records belonging to Izeta Group, The data reportedly includes customer personal details, contact information, purchase history, and spending records.
    Date: 2026-03-08T14:09:31Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-COLLECTION-IZETA-GROUP-5-904-CUSTOMER-RECORDS-LIVE-WOOCOMMERCE-KEYS-ERP-ACCESS
    Screenshots:
    None
    Threat Actors: macaroni
    Victim Country: Spain
    Victim Industry: Other Industry
    Victim Organization: izeta group
    Victim Site: izetagroup.com
  41. Alleged data sale of LE TEMPS DES CERISES JEANS
    Category: Data Breach
    Content: The threat actor claims to be selling 900,000 lines of data from Le Temps des Cerises Jeans, allegedly containing extracted data fields such as order link, gender, customer surname, customer first name, customer email, and more.
    Date: 2026-03-08T14:09:25Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-FR-Le-Temp-des-cerises
    Screenshots:
    None
    Threat Actors: DumpSec
    Victim Country: France
    Victim Industry: Manufacturing
    Victim Organization: le temps des cerises jeans
    Victim Site: letempsdescerises.com
  42. Alleged data breach of FNATH
    Category: Data Breach
    Content: The threat actor claims to have breached 197 GB of data from FNATH, allegedly containing 29,144 + 45,428 records with information such as birth name, email, ID, date of birth, and more.
    Date: 2026-03-08T14:02:10Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-197GO-FNATH-org-Association-des-accident%C3%A9s-de-la-vie
    Screenshots:
    None
    Threat Actors: Angel_Batista
    Victim Country: France
    Victim Industry: Non-profit & Social Organizations
    Victim Organization: fnath
    Victim Site: fnath.org
  43. INDOHAXSEC targets the website of Casino4Live
    Category: Defacement
    Content: The group claims to have defaced the website of Casino4Live.
    Date: 2026-03-08T13:54:25Z
    Network: telegram
    Published URL: https://t.me/IndoHaxSec3/67
    Screenshots:
    None
    Threat Actors: INDOHAXSEC
    Victim Country: Costa Rica
    Victim Industry: Gambling & Casinos
    Victim Organization: casino4live
    Victim Site: casino4live.com
  44. Alleged Sale of Access to Over 700 Compromised PCs
    Category: Initial Access
    Content: A threat actor claims to have access to more than 700 compromised PCs, stating that the number of infected systems is increasing daily.
    Date: 2026-03-08T13:54:01Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277807/
    Screenshots:
    None
    Threat Actors: francogambino83
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  45. DEFACER INDONESIAN TEAM targets the website of Party42nite
    Category: Defacement
    Content: The group claims to have defaced the website of Party42nite
    Date: 2026-03-08T13:33:58Z
    Network: telegram
    Published URL: https://t.me/c/2433981896/1202
    Screenshots:
    None
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: South Africa
    Victim Industry: Information Services
    Victim Organization: party42nite
    Victim Site: party42nite.com
  46. DEFACER INDONESIAN TEAM targets the website of Full Before Montauk
    Category: Defacement
    Content: The group claims to have defaced the website of Full Before Montauk.
    Date: 2026-03-08T13:22:17Z
    Network: telegram
    Published URL: http://t.me/c/2433981896/1198
    Screenshots:
    None
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: USA
    Victim Industry: Online Publishing
    Victim Organization: full before montauk
    Victim Site: fullbeforemontauk.com
  47. L4663R666H05T targets the website of Alrama Films
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Alrama Films.
    Date: 2026-03-08T12:34:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/804872
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: UAE
    Victim Industry: Automotive
    Victim Organization: alrama films
    Victim Site: alramafilms.ae
  48. Hax.or targets the website of Dinas PUPR Provinsi Sumatera Utara
    Category: Defacement
    Content: The group claims to have defaced the website of Dinas PUPR Provinsi Sumatera Utara.
    Date: 2026-03-08T12:12:58Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/129045
    Screenshots:
    None
    Threat Actors: Hax.or
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: dinas pupr provinsi sumatera utara
    Victim Site: dpupr.sumutprov.go.id
  49. Alleged data breach of Laika Mascotas
    Category: Data Breach
    Content: The group claims to have breached data from Laika Mascotas.
    Date: 2026-03-08T11:56:50Z
    Network: telegram
    Published URL: https://t.me/DedaleOffice/522
    Screenshots:
    None
    Threat Actors: Dedale Office
    Victim Country: Colombia
    Victim Industry: Other Industry
    Victim Organization: laika mascotas
    Victim Site: laika.com.co
  50. Alleged Sale of Open UPS Access
    Category: Initial Access
    Content: The threat actor claims to be offering access to multiple Open UPS systems, including both newly discovered and previously known accesses.
    Date: 2026-03-08T11:33:10Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277801/
    Screenshots:
    None
    Threat Actors: networkbase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  51. Alleged Sale of ADFS & WHMCS Access Credentials
    Category: Initial Access
    Content: A threat actor claims to possess approximately 2,700 ADFS and WHMCS access credentials allegedly obtained from various domains. The actor states that each domain is unique and claims that more than 80% of the accesses are valid. The post suggests that these accesses were previously observed being sold in auctions a few months ago.
    Date: 2026-03-08T11:31:41Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277797/
    Screenshots:
    None
    Threat Actors: 3olotoi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  52. Alleged data leak of Hakara
    Category: Data Breach
    Content: The threat actor claims to have leaked data related to Hakara.
    Date: 2026-03-08T11:29:14Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277798/
    Screenshots:
    None
    Threat Actors: HighRisk
    Victim Country: Vietnam
    Victim Industry: Music
    Victim Organization: hakara
    Victim Site: hakara.vn
  53. Alleged data leak West Kalimantan Provincial Government
    Category: Data Breach
    Content: The threat actor claims to have leaked the database from West Kalimantan Provincial Government. the reportedly data includes personnel records, names, IDs, positions, and department assignments.
    Date: 2026-03-08T11:19:04Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DOCUMENTS-DATABASE-EXPOSED-INDONESIA-WEST-KALIMANTAN-PROVINCIAL-GOVT-INTERNAL-ASSET
    Screenshots:
    None
    Threat Actors: Shenira6core
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  54. DEFACER INDONESIAN TEAM targets the website of DILIGENT SEARCHES REALTY LLC
    Category: Defacement
    Content: The group claims to have defaced the website of DILIGENT SEARCHES REALTY LLC.
    Date: 2026-03-08T11:07:54Z
    Network: telegram
    Published URL: https://t.me/c/2433981896/1196
    Screenshots:
    None
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: USA
    Victim Industry: Real Estate
    Victim Organization: diligent searches realty llc
    Victim Site: diligentsearches.com
  55. Alleged leak of PII data of Sofia Venturini
    Category: Data Breach
    Content: The threat actor claims to have leaked the PII data from Sofia Venturini, including alleged contact details, date of birth, location in Italy, and links to social media profiles.
    Date: 2026-03-08T11:01:00Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Sofia-Venturini-Dox
    Screenshots:
    None
    Threat Actors: dambss
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  56. Alleged data breach of Sagent Pharmaceuticals
    Category: Data Breach
    Content: The threat actor claims to have breached data from Sagent Pharmaceuticals and intends to publish it within 1-2 days.
    Date: 2026-03-08T10:50:19Z
    Network: tor
    Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/4963154147/overview
    Screenshots:
    None
    Threat Actors: Worldleaks
    Victim Country: USA
    Victim Industry: Healthcare & Pharmaceuticals
    Victim Organization: sagent pharmaceuticals
    Victim Site: sagentpharma.com
  57. DEFACER INDONESIAN TEAM targets the website of Grand Elm
    Category: Defacement
    Content: The group claims to have defaced the website of Grand Elm.
    Date: 2026-03-08T10:50:15Z
    Network: telegram
    Published URL: https://t.me/c/2433981896/1194
    Screenshots:
    None
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: USA
    Victim Industry: Real Estate
    Victim Organization: grand elm
    Victim Site: grandelm.com
  58. Nullsec Philippines targets the website of Ministry of Industry
    Category: Defacement
    Content: Group claims to have deface the website of Ministry of Industry.
    Date: 2026-03-08T10:34:02Z
    Network: telegram
    Published URL: https://t.me/nullsechackers/842
    Screenshots:
    None
    Threat Actors: Nullsec Philippines
    Victim Country: Thailand
    Victim Industry: Government & Public Sector
    Victim Organization: ministry of industry
    Victim Site: pdg.industry.go.th
  59. Alleged data leak of Pakistan students database
    Category: Data Breach
    Content: The group claims to have leaked Pakistani School student database. The compromised data reportedly includes student names, student IDs, class details, section information, and other academic records
    Date: 2026-03-08T10:32:37Z
    Network: telegram
    Published URL: https://t.me/ZeroCertHackers/1260
    Screenshots:
    None
    Threat Actors: Off-Line
    Victim Country: Pakistan
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  60. Alleged data breach of Medihelp Services
    Category: Data Breach
    Content: The threat actor claims to have breached Medihelp Services database, The leaked sample allegedly contains patient-related information such as full names, document details, and medical-related records.
    Date: 2026-03-08T10:32:07Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-FREE-LEAK-clinicamedihelp-com
    Screenshots:
    None
    Threat Actors: delitospenales
    Victim Country: Mexico
    Victim Industry: Hospital & Health Care
    Victim Organization: medihelp services
    Victim Site: clinicamedihelp.com
  61. Alleged leak of admin access to Computer Source Bangladesh
    Category: Initial Access
    Content: The group claims to have leaked admin login credentials belonging to Computer Source Bangladesh.
    Date: 2026-03-08T10:20:48Z
    Network: telegram
    Published URL: https://t.me/ZeroCertHackers/1259
    Screenshots:
    None
    Threat Actors: Off-Line
    Victim Country: Bangladesh
    Victim Industry: Information Technology (IT) Services
    Victim Organization: computer source bangladesh
    Victim Site: computersource.com.bd
  62. Alleged data breach of WayzeSMS
    Category: Data Breach
    Content: The threat actor claims to have leaked advertised WayzeSMS, the reportedly include WhatsApp, Facebook, Amazon, Instagram, Twitter, and Outlook.
    Date: 2026-03-08T10:20:43Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-WayzeSMS-com-USA-SMS-RCS-iMessage-Data-Checking
    Screenshots:
    None
    Threat Actors: obfuscatable
    Victim Country: USA
    Victim Industry: Network & Telecommunications
    Victim Organization: wayzesms
    Victim Site: wayzesms.com
  63. THE GARUDA EYE claims to target Egypt
    Category: Alert
    Content: A recent post by the group indicating that they are targeting Egypt.
    Date: 2026-03-08T10:19:47Z
    Network: telegram
    Published URL: https://t.me/GarudaEye/1240
    Screenshots:
    None
    Threat Actors: THE GARUDA EYE
    Victim Country: Egypt
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  64. Alleged cyberattack on Israeli weather station infrastructures
    Category: Cyber Attack
    Content: The group claims responsibility for conducting a cyberattack and breaching the main servers of Israeli weather station infrastructure.
    Date: 2026-03-08T09:54:33Z
    Network: telegram
    Published URL: https://t.me/HANDALA_HPR2/9
    Screenshots:
    None
    Threat Actors: Handala Hack
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  65. Alleged data leak of IndiHome
    Category: Data Breach
    Content: The group claims to have leaked data from IndiHome. The dataset contains including personal details such as names, contact information, and national identity numbers.
    Date: 2026-03-08T09:29:12Z
    Network: telegram
    Published URL: https://t.me/DedaleOffice/520
    Screenshots:
    None
    Threat Actors: Dedale Office
    Victim Country: Indonesia
    Victim Industry: Network & Telecommunications
    Victim Organization: indihome
    Victim Site: telkomsel.com
  66. Hax.or targets the website of IKIP PGRI Bojonegoro Library
    Category: Defacement
    Content: The group claims to have defaced the website of IKIP PGRI Bojonegoro Library.
    Date: 2026-03-08T09:14:43Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/129044
    Screenshots:
    None
    Threat Actors: Hax.or
    Victim Country: Indonesia
    Victim Industry: Library
    Victim Organization: ikip pgri bojonegoro library
    Victim Site: smartlab.ikippgribojonegoro.ac.id
  67. Hax.or targets the website of IKIP PGRI Bojonegoro
    Category: Defacement
    Content: The group claims to have defaced the website of IKIP PGRI Bojonegoro.
    Date: 2026-03-08T09:04:33Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/129043
    Screenshots:
    None
    Threat Actors: Hax.or
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: ikip pgri bojonegoro
    Victim Site: sim-asset.ikippgribojonegoro.ac.id
  68. Alleged data leak of Denpasar population database
    Category: Data Breach
    Content: The threat actor claims to have leaked and shared the Denpasar population database, reportedly exposing resident demographic records and related personal information from Denpasar, Indonesia.
    Date: 2026-03-08T08:59:52Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-Database-Share-By-YanXploit
    Screenshots:
    None
    Threat Actors: YanXploit
    Victim Country: Indonesia
    Victim Industry: Government Relations
    Victim Organization: denpasar population registry
    Victim Site: Unknown
  69. Alleged data breach of Colombian vaccination database
    Category: Data Breach
    Content: The threat actor claims to have breached 223,330 Colombian identification records from a government vaccination website on 19 Feb 2026, reportedly exposing various personal identification details.
    Date: 2026-03-08T08:20:09Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-database-extraida-Colombia-2026-223-330-Identificaciones
    Screenshots:
    None
    Threat Actors: ironatlas
    Victim Country: Colombia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  70. Cyberattack Hit Middlesex-London Health Unit
    Category: Cyber Attack
    Content: A cybersecurity incident affected the Middlesex-London Health Unit in London, forcing the organization to shut down some phone lines and internal software systems as a precaution. The health unit reported the incident to the privacy commissioner and the Ministry of Health while an investigation was launched to determine the cause and scope of the attack. Officials stated that certain services were temporarily disrupted while technical teams worked to secure the network and restore systems. At the time of reporting, authorities had not confirmed whether any sensitive data had been compromised.
    Date: 2026-03-08T07:46:22Z
    Network: openweb
    Published URL: https://www.cbc.ca/news/canada/london/health-unit-cyber-9.7118051
    Screenshots:
    None
    Threat Actors:
    Victim Country: Canada
    Victim Industry: Hospital & Health Care
    Victim Organization: middlesex-london health unit
    Victim Site: healthunit.com
  71. Alleged data sale of Airclaim
    Category: Data Breach
    Content: The threat actor claims to be selling 121 GB of data from Airclaim, allegedly containing information on 55,867 people, including documents such as passports, signatures, boarding passes, and other personal information.
    Date: 2026-03-08T07:43:00Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-EU-Airclaim-com-121GB
    Screenshots:
    None
    Threat Actors: HexDex
    Victim Country: Romania
    Victim Industry: Airlines & Aviation
    Victim Organization: airclaim
    Victim Site: airclaim.com
  72. Alleged cyberattack on surveillance cameras in Tel Aviv and Haifa
    Category: Cyber Attack
    Content: The threat actor claims to have targeted surveillance camera systems in Tel Aviv and Haifa, alleging that the cameras were disrupted and taken out of service during the operation.
    Date: 2026-03-08T07:28:29Z
    Network: telegram
    Published URL: https://t.me/UniTcyber313/215
    Screenshots:
    None
    Threat Actors: UniT 313
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  73. UniT 313 claims to target Israel
    Category: Alert
    Content: A recent post by the group indicating that they are targeting Israel.
    Date: 2026-03-08T07:14:26Z
    Network: telegram
    Published URL: https://t.me/UniTcyber313/214
    Screenshots:
    None
    Threat Actors: UniT 313
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  74. Alleged leak of Islamic Revolutionary Guard Corps (IRGC) linked files from Iran.
    Category: Data Breach
    Content: The threat actor claims to have leaked files related to the Islamic Revolutionary Guard Corps (IRGC) in Iran, including information allegedly exposing individuals linked to IRGC operations.
    Date: 2026-03-08T06:34:18Z
    Network: telegram
    Published URL: https://t.me/youranon_storm/1308
    Screenshots:
    None
    Threat Actors: Anonymous
    Victim Country: Iran
    Victim Industry: Government Administration
    Victim Organization: islamic revolutionary guard corps
    Victim Site: Unknown
  75. Alleged sale of unauthorized admin and shell access to an unidentified coffee shop
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified coffee shop in Germany.
    Date: 2026-03-08T06:32:31Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277755/
    Screenshots:
    None
    Threat Actors: Zimmer
    Victim Country: Germany
    Victim Industry: Restaurants
    Victim Organization: Unknown
    Victim Site: Unknown
  76. Alleged sale of unauthorized magento accesses
    Category: Initial Access
    Content: Threat actor claims to be selling 500 unauthorized magento accesses in multiple countries.
    Date: 2026-03-08T06:30:15Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277748/
    Screenshots:
    None
    Threat Actors: Bakardi
    Victim Country: Unknown
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  77. Alleged Sale of French Driving School Data
    Category: Data Breach
    Content: The threat actor claims to be selling the database of French driving school system, the database contains personal documents and identification records.
    Date: 2026-03-08T06:22:24Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-FR-French-driving-school-CNI-etc
    Screenshots:
    None
    Threat Actors: telaviv
    Victim Country: France
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  78. Alleged data breach of Dinas Kependudukan dan Pencatatan Sipil Provinsi DKI Jakarta
    Category: Data Breach
    Content: The group claims to have breached 539,737 Rows data from Dinas Kependudukan dan Pencatatan Sipil Provinsi DKI Jakarta.
    Date: 2026-03-08T06:16:52Z
    Network: telegram
    Published URL: https://t.me/DedaleOffice/517
    Screenshots:
    None
    Threat Actors: Dedale Office
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: dinas kependudukan dan pencatatan sipil provinsi dki jakarta
    Victim Site: Unknown
  79. Alleged Data Leak of Pakistan Government Personnel Information
    Category: Data Breach
    Content: The group claims to have leaked 2GB data from Pakistan Government. The compromised data reportedly includes Department, Name, Address, Date of Birth, Blood Group, Email, Government ID and ID Photos.
    Date: 2026-03-08T05:46:41Z
    Network: telegram
    Published URL: https://t.me/DedaleOffice/515
    Screenshots:
    None
    Threat Actors: Dedale Office
    Victim Country: Pakistan
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  80. Alleged unauthorized access to Argentine Judiciary Admin Panel
    Category: Initial Access
    Content: The threat actor claims to have access to an administrative panel linked to the Argentine Judicial Branch, allegedly containing sensitive information related to prosecutors and applicants for government positions.
    Date: 2026-03-08T03:56:21Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Gov-admin-panel-linked-to-the-Argentine-judiciary
    Screenshots:
    None
    Threat Actors: ORION
    Victim Country: Argentina
    Victim Industry: Government Administration
    Victim Organization: argentine judicial branch
    Victim Site: Unknown
  81. Alleged unauthorized access to SCADA system in Ukraine
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to SCADA system
    Date: 2026-03-08T03:45:53Z
    Network: telegram
    Published URL: https://t.me/privetOTof223/527
    Screenshots:
    None
    Threat Actors: OverFlame
    Victim Country: Ukraine
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  82. r0ckin targets the website of AvalAi
    Category: Defacement
    Content: The group targets the website of AvalAi.
    Date: 2026-03-08T03:39:10Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41594289
    Screenshots:
    None
    Threat Actors: r0ckin
    Victim Country: Iran
    Victim Industry: Information Technology (IT) Services
    Victim Organization: avalai
    Victim Site: avalai.ir
  83. DieNet claims to target USA
    Category: Alert
    Content: A recent post by the group indicates that they are targeting USA.
    Date: 2026-03-08T03:30:25Z
    Network: telegram
    Published URL: https://t.me/dienet3/407
    Screenshots:
    None
    Threat Actors: DieNet
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  84. /Rayzky_ targets the website of AsnaFlenjan
    Category: Defacement
    Content: The group claims to have defaced the website of AsnaFlenjan.
    Date: 2026-03-08T03:30:22Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41593928
    Screenshots:
    None
    Threat Actors: /Rayzky_
    Victim Country: Iran
    Victim Industry: Law Practice & Law Firms
    Victim Organization: asnaflenjan
    Victim Site: asnaflenjan.ir
  85. Alleged Data Breach of Municipal Government of Juárez
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Government of Juárez, Nuevo León, the dataset contains including personal information, identification numbers, and administrative records associated with the Juárez municipal government platforms.
    Date: 2026-03-08T02:27:56Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-Gobierno-Juarez-Nuevo-leon-MX-dbs
    Screenshots:
    None
    Threat Actors: godislife69x
    Victim Country: Mexico
    Victim Industry: Government Administration
    Victim Organization: municipal government of juárez
    Victim Site: soyjuarense.juarez-nl.gob.mx
  86. DieNet claims to target Digital Systems in Kuwait and Other Gulf States
    Category: Alert
    Content: A recent post by the group indicates that they are targeting Digital Systems in Kuwait and Other Gulf States
    Date: 2026-03-08T01:56:17Z
    Network: telegram
    Published URL: https://t.me/dienet3/409
    Screenshots:
    None
    Threat Actors: DieNet
    Victim Country: Kuwait
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  87. Space42 Suffers Data Breach
    Category: Data Breach
    Content: Space42 was reportedly subjected to a data breach by the hacker group Mobir, According to statements released by the group, the attack targeted Space42’s network in response to alleged cooperation between the company and Israeli and U.S. entities.Mobir stated that it gained access to internal systems and published screenshots of server management dashboards as evidence of the breach.The group also claimed to have leaked documents related to contracts between Yahsat one of the companies that merged to form Space42—and the Israeli satellite communications company Gilat.
    Date: 2026-03-08T00:10:03Z
    Network: telegram
    Published URL: https://t.me/cyberbannews_ir/20266
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: UAE
    Victim Industry: Defense & Space
    Victim Organization: space42
    Victim Site: space42.ai
  88. Alleged Data Breach of Instituto Técnico Superior
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Instituto Técnico Superior – MEC, the dataset contains students personal informations.
    Date: 2026-03-08T00:02:45Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-caeff-com-py%C2%A0-leak
    Screenshots:
    None
    Threat Actors: Tanaka
    Victim Country: Paraguay
    Victim Industry: Education
    Victim Organization: técnico superior – mec
    Victim Site: caeff.com.py