Cyber Dispatch™️
311 subscribers
17 photos
1 video
37 links
The definitive source for critical cybersecurity news. When a major threat breaks, we dispatch.

#CyberDispatch #CyberSecurity #InfoSec #ThreatIntelligence #ZeroDay #DataBreach #SecurityNews
Download Telegram
France just mandated digital ID for every citizen by banning social media for minors.

Under 15s will be blocked from IG, TikTok, FB, Snapchat and any platform allowing interactions, public broadcasts or user communities.
Forwarded from 𓂆 Palestine
The Handala hacker group:

"Colonel, Air Force Lady; You have only tonight. We suggest you check your phone right now… You wouldn’t want us to talk about your meeting with us in Uzbekistan tomorrow, would you?

Remember, some encounters don’t stay in the past forever The choice is yours; The shadows see everything.

This is your last warning tonight;

Handala gives you only until tomorrow morning. You didn’t see this coming, did you? Sometimes, the shadows are closer than you think… The choice is yours; After sunrise, everything will change."
Handala hacker group claims first-ever leak of photo showing Elbit Systems Hermes drone design team

The hacker group Handala has released a statement claiming it has published, for the first time, an image showing what it describes as the core design and development team behind the Hermes drone program at Elbit Systems.

In its statement, the group asserted that the Hermes drone project has long been concealed under strict security measures, and framed the image leak as the beginning of a broader effort to expose what it called “hidden aspects” of Israeli occupation military and security programs.

Handala added that further details, including additional information and names, would be released in subsequent disclosures. "This image marks only the beginning of uncovering the hidden aspects of the Zionist regime’s military and security projects," they wrote.

#TGITM @TheGhostITM
Hacker group Handala:

All data concerning the sensitive electrical infrastructure of the Zionist regime has been extracted by Handala.

#TGITM @TheGhostITM
Microsoft fixes email sending disruption in classic Outlook

Microsoft has resolved a technical issue in classic Outlook that caused some users to be unable to send emails via Outlook.com.
The FBI has declared a “major cyberattack.”

A group called Salt Typhoon breached the same systems the FBI uses for surveillance.

Leaked data reportedly includes phone numbers of active FBI surveillance targets.
2
The pro-Palestine hacker group Handala asserts it operates independently, denying any state affiliation.

Cyber Dispatch: Those labeling Handala as an Iranian state-backed group should re-examine the group’s operational history.

#TGITM
Cyber Dispatch: #OpIsrael has always been a decentralized campaign driven by hacktivists across multiple countries, including Palestinian hackers. Broad attribution to Hamas by some analysts is baseless. Likewise, labeling Handala as an Iranian state operation reflects poor attribution discipline, not evidence.
Cyber Dispatch: Handala has always been a pro‑Palestine hacktivist entity—nothing new there. What’s changed is the operational scope. Expanding beyond #OpIsrael into broader geopolitical targets isn’t random; it reflects shifting directives aligned with pro‑Iranian influence. The pattern, targeting logic, and messaging strongly suggest Iranian-linked priorities driving this evolution.
The FBI built its power on spying on others—today, it got doxed itself.

Turns out, even the watchers aren’t immune to being watched.
The hacker group Handala has posted a direct warning to former Israeli Chief of General Staff Herzi Halevi, claiming that the group is “sitting at the chokepoint” and that Israeli occupation military figures are under their surveillance. The message also threatened that exposure of their intelligence will occur at a time of Handala’s choosing.

#TGITM @TheGhostITM
Anthropic’s new Claude Mythos model has found thousands of high-severity zero-days across major OS, browsers, and software — showing capabilities that can surpass top human experts.

Project Glasswing deploys it to secure critical systems ahead of potential misuse.
Hackers are targeting U.S. critical infrastructure with direct PLC disruption.

They access internet exposed devices using legitimate tools, then alter system data and operations, disrupting water, energy, and government services and causing financial loss.
APT28 ran a global router hijack to steal credentials.

The group compromised MikroTik and TP-Link devices, rewrote DNS settings, and redirected traffic for credential theft at scale -- impacting 18,000+ IPs across 120 countries, including government and cloud targets.
Docker fixed a flaw letting attackers bypass AuthZ plugins with a padded API request (1MB).

The plugin sees no body and allows it, while Docker executes it—creating a privileged container with host access and exposed credentials.
Attackers are hijacking exposed ComfyUI servers into crypto mining and proxy botnets.

Scanners exploit unauthenticated setups via custom nodes, run code, and install persistent malware. Infected systems mine crypto and resist removal.
Flowise has a CVSS 10.0 RCE flaw (CVE-2025-59528) now under active attack.

A bug in MCP config lets attackers run JavaScript with full system access using just an API token. Over 12,000 exposed instances raise risk.
US agencies warn of cyber intrusions targeting industrial systems

According to Politico, hackers are exploiting vulnerabilities in industrial control systems—particularly PLCs—impacting critical infrastructure like water and energy. Rockwell Automation devices are among those targeted.
German authorities report increased activity by APT28, exploiting vulnerable TP-Link routers to spy on military, government, and critical infrastructure targets. The group has previously targeted German institutions.
Surge in AI-driven cyberattacks targeting the UAE

The United Arab Emirates has reported a significant rise in cyberattacks, escalating alongside regional tensions. A large portion of these attacks are carried out using AI-powered tools.

The attacks include phishing campaigns, vulnerability reconnaissance, and malware development, with hundreds of thousands of incidents recorded daily.
APT28 is targeting Ukraine and allied supply chains using a confirmed zero-day (CVE-2026-21513) and PRISMEX malware.

It also exploits CVE-2026-21509, with LNK delivery possibly chaining both flaws to enable theft and file-wiping.