A drone attack on strategic electronic warfare and radar centers in Haifa.
🔍 Domain intel: not all ccTLDs are created equal.
.to (Tonga) → attacker’s playground. Lax registration, no public WHOIS. Perfect for phishing infra, C2, and propaganda sites.
.tw (Taiwan) → attacker’s target. High user trust → prime impersonation bait for banking & gov phishing.
Know the risk.
#cybersecurity #threatintel #infosec #domains
.to (Tonga) → attacker’s playground. Lax registration, no public WHOIS. Perfect for phishing infra, C2, and propaganda sites.
.tw (Taiwan) → attacker’s target. High user trust → prime impersonation bait for banking & gov phishing.
Know the risk.
#cybersecurity #threatintel #infosec #domains
The US Department of State just announced a $10,000,000 bounty on the hackers behind the Kash Patel Gmail breach.
Cyber Dispatch: Keep trying for at least 5 years to find those hackers.
Translation: We traced them… actually no. We found them… not really. They’re in Iran… or maybe just Iranian… or honestly, we have no idea who they are 😭
Cyber Dispatch: Keep trying for at least 5 years to find those hackers.
Translation: We traced them… actually no. We found them… not really. They’re in Iran… or maybe just Iranian… or honestly, we have no idea who they are 😭
🤔1
The “Handala” group claims responsibility for a cyberattack on the Good Food Store in Missoula, Montana, alleging the deletion of around 4TB of data and a full shutdown of operations. The store, which employs over 300 people, is reportedly facing significant disruption following the incident.
#TGITM @TheGhostITM
#TGITM @TheGhostITM
The Anonymous collective claims responsibility for data deletion incidents affecting multiple Israeli websites.
#TGITM @TheGhostITM
#TGITM @TheGhostITM
Cyber Dispatch™️
For those seeking the original Handala Hack logo, consider this a gift. #TGITM @TheGhostITM
Fan channels and profiles associated with Handala may use this original logo.
The sheriff's office in Jackson County, Indiana, had to shut down all computer systems following a ransomware attack.
The EU Commission, ENISA, and the DG for Digital Services have been compromised by ShinyHunters.
Leaked data includes:
Emails & attachments
Full SSO user directory
DKIM signing keys
AWS config snapshots
NextCloud/Athena data
Internal admin URLs
Leaked data includes:
Emails & attachments
Full SSO user directory
DKIM signing keys
AWS config snapshots
NextCloud/Athena data
Internal admin URLs
Security researchers used a low-cost consumer satellite dish to intercept satellite signals and found massive amounts of unencrypted traffic.
Revealing:
📡 Military and government comms including GPS data
📡 Credit card transactions
📡 Phone calls and texts from remote cell towers
📡 In-flight Wi-Fi activity
Revealing:
📡 Military and government comms including GPS data
📡 Credit card transactions
📡 Phone calls and texts from remote cell towers
📡 In-flight Wi-Fi activity
Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug
The White House App has OneSignal's full GPS pipeline compiled in, polling your location every 4.5 minutes, syncing your exact coordinates to a third party server.
Cyberattack by the Handala hacker group and disclosure of confidential data belonging to the former Israeli Defense Minister.
#TGITM @TheGhostITM
#TGITM @TheGhostITM
The Handala hacker group has hacked over 70 pages of communications belonging to Yoav Gallant, the former Israeli Defense Minister, and says it has infiltrated all of his confidential and personal systems.
#TGITM @TheGhostITM
#TGITM @TheGhostITM
Handala emphasized that, due to the high informational value and ongoing exploitation, most of these chats will not be published for now, so that the regime's leaders remain in a state of anxiety and sleeplessness.
#TGITM @TheGhostITM
#TGITM @TheGhostITM
Cyber warfare is entering a new phase: AI vs AI.
Security experts warn that both attackers and defenders now deploy intelligent systems, shifting humans into coordination roles rather than direct operators.
As Joe Carson puts it, AI is a turbo engine, powerful when guided, but dangerous when misused, amplifying vulnerabilities instead of fixing them.
Security experts warn that both attackers and defenders now deploy intelligent systems, shifting humans into coordination roles rather than direct operators.
As Joe Carson puts it, AI is a turbo engine, powerful when guided, but dangerous when misused, amplifying vulnerabilities instead of fixing them.