Signature Healthcare hit by cyber incident in Massachusetts

Signature Healthcare in Brockton, Mass., shifted to manual operations, diverted ambulances and canceled some services after a cyber incident.

DysruptionHub
Drift $280M crypto theft linked to 6-month in-person operation

The Drift Protocol says that the $280+ million hack it suffered last week was the result of a long-term, carefully planned operation that included building "a functioning operational presence inside the Drift ecosystem."

BleepingComputer
Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps

ANY.RUN cuts MTTR by 21 minutes per case, reducing escalations and breach exposure in multi-OS attacks.

The Hacker News

🔵 THREAT INTELLIGENCE

Hackers exploit React2Shell in automated credential theft campaign

Vulnerability | CRITICAL
CVEs: CVE-2025-55182

Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable...

Full analysis:
https://www.yazoul.net/news/news/hackers-exploit-react2shell-in-automated-credential-theft-campaign

#CyberSecurity #APT #IncidentResponse

Next.js React2Shell Actively Exploited - Credential Theft Campaign

Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable Next.js apps. [...]

Yazoul Security

The way things are these days, you'd hope that immigration law firms would be especially careful to secure clients' files.

Dream on.

New by me: Two data security incidents affected immigration law firms and their clients

https://databreaches.net/2026/04/06/two-data-security-incidents-affected-immigration-law-firms-and-their-clients/

#databreach #thirdparty #dataleak #incidentresponse

When people keep advising victims not to pay ransom because threat actors can't be trusted to really delete all the data, my inner researcher kicks in and wants to know how often that really happens.

So I started sending out inquiries.

Now you might think that those who publicly and repeatedly urge journalists to "spread the word" not to pay would respond and share some of their experiences with untrustworthy threat actors, but no..... they didn't even respond.

Read about the replies I did get, because they really surprised me.

I have no doubt that some professionals will hate what I have reported, but then, perhaps they should have responded, too, if they think differently.

How often do threat actors default on promises to delete data?
https://databreaches.net/2026/04/05/how-often-do-threat-actors-default-on-promises-to-delete-data/

#databreach #incidentresponse #ransom

@zackwhittaker @campuscodi @euroinfosec @lawrenceabrams @jgreig @securityaffairs @Hackread @h4ckernews

New playlist online: from malware analysis to ethical hacking demos. Check it out here 👉 https://www.youtube.com/playlist?list=PLXqx05yil_meQN-JX5Ej-kj07xEK8QYLH
#Malware #EthicalHacking #CyberDefense #NetworkSecurity #IncidentResponse
260404 rootshell.online

YouTube
New playlist online: from malware analysis to ethical hacking demos. Check it out here 👉 https://www.youtube.com/playlist?list=PLXqx05yil_meAulcBo3AfHjo3yM_aYpS3
#Malware #EthicalHacking #CyberDefense #NetworkSecurity #IncidentResponse
260404 rootshell.online

YouTube
New playlist online: from malware analysis to ethical hacking demos. Check it out here 👉 https://www.youtube.com/playlist?list=PLXqx05yil_mflapCAVj54j9RMYOIFa4BD
#Malware #EthicalHacking #CyberDefense #NetworkSecurity #IncidentResponse
260404 rootshell.online

YouTube
The Modern SOC Analyst's Arsenal: Tools, AI, and Skills for 2026

I've spent years staring at dashboards at 2am, chasing false positives, and piecing together attack chains from fragmented log data. The job has changed dramati