Skip to content

Threat Hunting

Louis Vuitton Data Breach

Date of Incident: 2024 Overview: In 2024, Louis Vuitton suffered a data breach affecting 3.6 million customers. Personal information, including names, contact details, and purchase histories, was compromised due to a sophisticated malware infection on an employee’s device that infiltrated their internal SaaS system. The breach involved unauthorized access via command and scripting techniques and… Read More »Louis Vuitton Data Breach

UNC3886 breach of Singapore’s four largest telcos

Date of Incident: 2024 Overview: In 2024, the APT group UNC3886 breached Singapore’s four major telecom companies—Singtel, StarHub, M1 Limited, and TPG Telecom. The attackers accessed some critical systems but failed to cause service disruptions or access sensitive customer data. Techniques used included exploiting public-facing applications and leveraging valid accounts, with attempts at lateral movement… Read More »UNC3886 breach of Singapore’s four largest telcos

Flickr Data Breach

Date of Incident: 2026-02-05 Overview: The Flickr Data Breach, reported on February 6, 2026, involved the exposure of user data including real names, email addresses, IP addresses, usernames, account types, general location, and platform activity. However, passwords and payment card details remained secure. The breach likely resulted from an exploitation of a vulnerability or compromised… Read More »Flickr Data Breach

Spain’s Ministry of Science Cyberattack

Date of Incident: 2023 Overview: In 2023, Spain’s Ministry of Science suffered a significant cyberattack, leading to the partial shutdown of its IT systems and suspension of key administrative services impacting researchers, universities, and students. The breach involved the use of custom PowerShell scripts for lateral movement and ransomware deployment, exploiting valid accounts for initial… Read More »Spain’s Ministry of Science Cyberattack

Weekly Report: New Hacking Techniques and Critical CVEs 27 Jan- 2 Feb 2026

This week witnessed a critical surge in zero-day exploitation, mass-scale data breaches, and advanced persistence techniques targeting enterprise infrastructure across multiple verticals. Five confirmed critical vulnerabilities entered active exploitation phase, with 13 KEV (Known Exploited Vulnerability) additions recorded by CISA. The threat landscape reflects a strategic shift from encryption-based ransomware toward data exfiltration and extortion… Read More »Weekly Report: New Hacking Techniques and Critical CVEs 27 Jan- 2 Feb 2026