🚨New ransom group blog post!🚨

Group name: incransom
Post title: Greenology Products
Info: https://cti.fyi/groups/incransom.html

#ransomware #cti #threatintelligence #cybersecurity #infosec

How I Stopped Losing Track of My Cybersecurity Studies

The disorganized mess that was my cert prep — and what fixed it:
https://thecybercraft.medium.com/how-i-stopped-losing-track-of-my-cybersecurity-studies-022a2f122294

#cybersecurity #productivity #infosec #technology #certification #oscp

How I Stopped Losing Track of My Cybersecurity Studies

When I started preparing for my first cybersecurity certification, I believed the most challenging part would be mastering the technical…

Medium
New daily playlist: the latest talks and tutorials in cybersecurity and hacking. Stay sharp, stay safe. 👉 https://www.youtube.com/playlist?list=PLXqx05yil_mcrq_rdWw90OvHZ9KaaFC1R
#CyberSecurity #InfoSec #EthicalHacking #OnlineSafety #Phishing
260329 rootshell.online

YouTube

Shwapno Retail Chain Suffers Data Breach Affecting 4 Million Customers

Shwapno, a major Bangladeshi retailer, suffered a data breach affecting 4 million customers after hackers stole names, phone numbers, and purchase histories. The company refused a $1.5 million ransom demand, resulting in the public leak of sensitive customer records on social media.

****
#cybersecurity #infosec #incident #databreach
https://beyondmachines.net/event_details/shwapno-retail-chain-suffers-data-breach-affecting-4-million-customers-p-2-0-p-t/gD2P6Ple2L

Shwapno Retail Chain Suffers Data Breach Affecting 4 Million Customers

Shwapno, a major Bangladeshi retailer, suffered a data breach affecting 4 million customers after hackers stole names, phone numbers, and purchase histories. The company refused a $1.5 million ransom demand, resulting in the public leak of sensitive customer records on social media.

BeyondMachines
Possible Phishing 🎣
on: ⚠️hxxps[:]//auburn-unicu-acc-sc[.]weebly[.]com
🧬 Analysis at: https://urldna.io/scan/69c91c213b775000081b5fea
#cybersecurity #phishing #infosec #urldna #scam #infosec

ASN: AS7522
Location: Takamatsu, JP
Added: 2026-03-26T12:00

#shodansafari #infosec

📊 EUVD Weekly CVSS Summary

🟡 Average Score: 6.8/10 (Medium)
📈 Vulnerabilities: 985
⬇️ Min: 1.2 | ⬆️ Max: 10.0

📅 Period: 2026-03-22 - 2026-03-28

#cybersecurity #infosec #euvd #cvss #vulnerability

Possible Phishing 🎣
on: ⚠️hxxps[:]//apps[.]complete-docusign-pdf-solution[.]successful-cpsess5970449126[.]dailysports[.]es
🧬 Analysis at: https://urldna.io/scan/69c9226d3b775000081b6077
#cybersecurity #phishing #infosec #urldna #scam #infosec

#infosec #cybercrime #ransomware

GangExposed Ru es un investigador de ciberdelincuencia que logró identificar a los hackers Handala responsables del ataque contra el director del FBI, Kash Patel.

También ha identificado a otros grupos de ciberdelincuentes y solicita al FBI que haga públicas sus detenciones.

https://x.com/i/status/2037954367505223900

GangExposed RU (@GangExposed_RU) on X

🚨 Handala Exposed: I have the names, connections, and photos of key participants. Following the recent hack of the FBI Director, I have identified 14 direct participants of the Handala group - including hackers, operators, and a coordinator-curator (in addition to Ali

X (formerly Twitter)

Critical RCE Vulnerability in Kali Forms Plugin Under Active Exploitation

Kali Forms for WordPress contains a critical unauthenticated remote code execution vulnerability (CVE-2026-3584) that is being exploited in the wild. Attackers can take full control of affected servers by sending malicious requests to the plugin's form processing function.

**If you are using Kali Forms, this is urgent. Immediately update to version 2.4.10 to block active exploitation. If you cannot patch right away, disable the plugin.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-rce-vulnerability-in-kali-forms-plugin-under-active-exploitation-f-q-i-r-2/gD2P6Ple2L

Critical RCE Vulnerability in Kali Forms Plugin Under Active Exploitation

Kali Forms for WordPress contains a critical unauthenticated remote code execution vulnerability (CVE-2026-3584) that is being exploited in the wild. Attackers can take full control of affected servers by sending malicious requests to the plugin's form processing function.

BeyondMachines