March 3, 2026
Envirogen Technologies Allegedly Targeted by Anubis Ransomware
Threat Intelligence
Executive Summary : Envirogen Technologies, Inc. has reportedly become the latest victim of a large-scale ransomware attack. The ransomware group Anubis has claimed responsibility, alleging the exfiltration of approximately 3.6 terabytes of data comprising over three million…
Read More
February 27, 2026
Data Leak – Substack Confirms Security Incident
Threat Intelligence
Executive Summary Substack, a subscription-based publishing platform, suffered a data breach that occurred in October 2025 and was discovered on February 3, 2026, during which an unauthorized party accessed and later leaked user account data affecting overall 697,298 users;…
Read More
February 26, 2026
Fit-Line Global Data Leak
Threat Intelligence
Executive Summary On January 9, 2026, the ransomware group INC Ransom publicly claimed responsibility for a cyberattack against Fit-Line Global, a manufacturing-sector organization. The group alleges exfiltration of sensitive corporate and employee data, including personal…
Read More
February 17, 2026
DAF Senegal Data Leak
Threat Intelligence
Executive Summary In February 2026, the ransomware group Green Bloods publicly claimed responsibility for a cyber intrusion targeting the Directorate of File Automation (DAF), Senegal. The group alleges exfiltration of national identity records,…
Read More
February 9, 2026
Tulsa International Airport Data Breach Claim: Alleged Ransomware Attack by Qilin
Threat Intelligence
Executive Summary The ransomware group Qilin has claimed responsibility for an alleged cyberattack against Tulsa International Airport (TUL). The group listed the airport on its dark web leak site and published a limited…
Read More
February 3, 2026
Gurucul Native Out-of-the-box Enrichment: Adding Context That Results in Better Security
Threat Intelligence
Summary Modern security teams are overwhelmed not by a lack of data, but by a lack of context. Raw logs and alerts, when viewed in isolation, rarely tell the full story of an attack. Security analysts need enriched data…
Read More
February 2, 2026
Neo Group Data Leak
Threat Intelligence
Introduction On January 15, 2026, the ransomware group Qilin publicly claimed responsibility for a major data breach involving Neo Group Food and Beverage. According to the group’s disclosure, the attack resulted in the exposure of highly sensitive corporate and personal…
Read More
January 28, 2026
17.5 Million Instagram Accounts Exposed in Major Data Leak
Threat Intelligence
About the data breach: Instagram users were recently impacted by a large-scale data leak where attackers got personal information linked to around 17.5 million accounts. Based on the reports published by Malwarebytes and…
Read More
January 23, 2026
Punjab Forensic Science Agency Data Breach
Threat Intelligence
Summary: The Punjab Forensic Science Agency is a modern science center run by the Punjab government in Pakistan. It studies evidence for criminal cases using labs like DNA, toxicology, and computer forensics. The agency helps the police…
Read More
January 22, 2026
Habib Bank AG Zurich Data Leak
Threat Intelligence
Summary: On November 05, 2025, the ransomware group Qilin publicly claimed responsibility for a significant data breach targeting Habib Bank AG Zurich. According to the threat actor’s statement, the attack resulted in the exposure of highly sensitive internal and customer-related…
Read More
January 21, 2026
Atalian Global Services Data Leak: A Deep Dive Into the Qilin Ransomware Exposure
Threat Intelligence
Introduction On December 28, 2025, the ransomware group Qilin announced that it had carried out a significant data breach against Atalian Global Services, claiming responsibility for the incident. According to the group, the attack led to the disclosure of highly…
Read More
December 23, 2025
Curated Threat Intelligence: Your Fastest Path to Real-Time Defense
Threat Intelligence
Operationalizing On-Demand Threat Intelligence: Why Speed Matters Static Feeds Don’t Stop Dynamic Threats Threat intelligence is everywhere — CISA advisories, ISAC alerts, curated partner feeds, external and internal research. But here’s the truth: intelligence that isn’t operationalized is…
Read More