Cyber Dispatch™️
For those seeking the original Handala Hack logo, consider this a gift. #TGITM @TheGhostITM
Fan channels and profiles associated with Handala may use this original logo.
The sheriff's office in Jackson County, Indiana, had to shut down all computer systems following a ransomware attack.
The EU Commission, ENISA, and the DG for Digital Services have been compromised by ShinyHunters.
Leaked data includes:
Emails & attachments
Full SSO user directory
DKIM signing keys
AWS config snapshots
NextCloud/Athena data
Internal admin URLs
Leaked data includes:
Emails & attachments
Full SSO user directory
DKIM signing keys
AWS config snapshots
NextCloud/Athena data
Internal admin URLs
Security researchers used a low-cost consumer satellite dish to intercept satellite signals and found massive amounts of unencrypted traffic.
Revealing:
📡 Military and government comms including GPS data
📡 Credit card transactions
📡 Phone calls and texts from remote cell towers
📡 In-flight Wi-Fi activity
Revealing:
📡 Military and government comms including GPS data
📡 Credit card transactions
📡 Phone calls and texts from remote cell towers
📡 In-flight Wi-Fi activity
Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug
The White House App has OneSignal's full GPS pipeline compiled in, polling your location every 4.5 minutes, syncing your exact coordinates to a third party server.
Cyberattack by the Handala hacker group and disclosure of confidential data belonging to the former Israeli Defense Minister.
#TGITM @TheGhostITM
#TGITM @TheGhostITM
The Handala hacker group has hacked over 70 pages of communications belonging to Yoav Gallant, the former Israeli Defense Minister, and says it has infiltrated all of his confidential and personal systems.
#TGITM @TheGhostITM
#TGITM @TheGhostITM
Handala emphasized that, due to the high informational value and ongoing exploitation, most of these chats will not be published for now, so that the regime's leaders remain in a state of anxiety and sleeplessness.
#TGITM @TheGhostITM
#TGITM @TheGhostITM
Cyber warfare is entering a new phase: AI vs AI.
Security experts warn that both attackers and defenders now deploy intelligent systems, shifting humans into coordination roles rather than direct operators.
As Joe Carson puts it, AI is a turbo engine, powerful when guided, but dangerous when misused, amplifying vulnerabilities instead of fixing them.
Security experts warn that both attackers and defenders now deploy intelligent systems, shifting humans into coordination roles rather than direct operators.
As Joe Carson puts it, AI is a turbo engine, powerful when guided, but dangerous when misused, amplifying vulnerabilities instead of fixing them.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a newly disclosed vulnerability affecting F5 BIG-IP systems to its Known Exploited Vulnerabilities (KEV) catalog, warning that the flaw is being actively leveraged in real-world attacks.
CVE-2025-53521 is an unspecified vulnerability within F5 BIG-IP Access Policy Manager (APM) that could allow remote code execution (RCE).
CVE-2025-53521 is an unspecified vulnerability within F5 BIG-IP Access Policy Manager (APM) that could allow remote code execution (RCE).
Hacktivist identifying as NetStrike claims to have compromised the industrial control systems (ICS) of a power facility in Tel Aviv.
Former U.S. Army intelligence officer & cybersecurity expert Josephine Guilbeau (17yrs service w/ USCYBERCOM, DIA, NSA) is challenging the system she served.
Using the U.S.’ own definition of “terrorism,” she dissects the Minab school strike—175+ killed, mostly girls aged 7-12.
When truth erupts from a counterterrorism insider, it’s too heavy to bury.
#TGITM @TheGhostITM
Using the U.S.’ own definition of “terrorism,” she dissects the Minab school strike—175+ killed, mostly girls aged 7-12.
When truth erupts from a counterterrorism insider, it’s too heavy to bury.
#TGITM @TheGhostITM