<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Rankteo Cyber Security Detailed Incidents with Videos</title>
        <link>https://www.rankiteo.com</link>
        <description>Latest cyber security incidents with detailed analysis and videos</description>
        <language>en-us</language>
        <lastBuildDate>Fri, 24 Apr 2026 15:08:28 +0000</lastBuildDate>
        <pubDate>Fri, 24 Apr 2026 15:08:28 +0000</pubDate>
        <ttl>60</ttl>
    <item>
        <title>Acram Digital: Zero-day Vulnerability in Gogs Leads to Hundreds of Compromised Servers</title>
        <link>https://www.rankiteo.com/company/acram-digital/incident/ACR1765814240</link>
        <description>Critical Zero-Day Vulnerability in Gogs Exploited for Remote Code Execution

A severe, unpatched zero-day vulnerability in Gogs, a widely used self-hosted Git service, has been actively exploited in the wild, leading to remote code execution (RCE) on exposed instances. Security researchers uncovered the flaw during routine scans of internet-facing Gogs servers, revealing that attackers have already compromised hundreds of systems across diverse infrastructures.

The vulnerability stems from improper input validation in Gogs’ codebase, allowing threat actors to send malicious payloads and execute arbitrary commands on vulnerable servers. While the flaw has not yet been assigned a CVE identifier, its exploitation has resulted in unauthorized access, potential data breaches, and full server takeovers. The impact is particularly concerning given Gogs’ adoption in numerous development and enterprise environments.

With no official patch available, security experts urge administrators to restrict access to Gogs instances by placing them behind firewalls, deploying web application firewalls (WAFs) to block exploitation attempts, and monitoring logs for suspicious activity. Regular system audits are also recommended to detect signs of compromise.

The incident underscores the risks of self-hosted services, especially when updates and security patches lag behind emerging threats. As the situation evolves, users await further guidance from the Gogs development team on a permanent fix. The cybersecurity community continues to track the vulnerability’s exploitation and potential long-term consequences.</description>
        <pubDate>Mon, 15 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/acram-digital/incident/ACR1765814240</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/ACR1765814240-acram-digital.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Salt Lake City School District: Worried that your personal data has been leaked online? Here's what you should know</title>
        <link>https://www.rankiteo.com/company/slcschools/incident/SLC1765816827</link>
        <description>Salt Lake City School District Vendor Breach Exposes Student Data, Highlighting Growing Social Engineering Risks

A recent data breach affecting the Salt Lake City School District has exposed sensitive student information, underscoring the evolving tactics of cybercriminals. In an email to parents, the district confirmed that hackers infiltrated one of its vendors, compromising personal data—including names, dates of birth, grades, addresses, and contact details—though Social Security numbers were reportedly unaffected.

While the breach did not include financial information, cybersecurity experts warn that even basic personal data can be weaponized. Gerald Kasulis of NordVPN noted that scammers are increasingly shifting from traditional financial fraud to social engineering attacks, using stolen details to impersonate trusted figures—such as government officials, medical providers, or family members—to manipulate victims.

A NordVPN survey revealed that many Americans underestimate the risks of such breaches, despite widespread awareness that personal data is often circulating on the dark web. Kasulis emphasized that even seemingly minor exposures can lead to significant harm, as attackers exploit trust to gain access to more sensitive information.

The incident serves as a reminder that non-financial data breaches, while often dismissed as low-risk, can still enable sophisticated fraud schemes. The Salt Lake City School District’s case highlights the broader trend of cybercriminals leveraging basic personal details to bypass traditional security measures.</description>
        <pubDate>Mon, 15 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/slcschools/incident/SLC1765816827</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/SLC1765816827-slcschools.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>GeoSolutions: GeoServer Vulnerability Exploitation Facilitates External Entity Attacks</title>
        <link>https://www.rankiteo.com/company/geosolutionsgroup/incident/GEO1765822581</link>
        <description>Critical XXE Vulnerability Discovered in GeoServer Exposes Geospatial Data to Attacks

A severe security flaw in GeoServer, an open-source platform for sharing and editing geospatial data, has been identified, leaving organizations vulnerable to XML External Entity (XXE) attacks. The vulnerability stems from insufficient input sanitization, allowing attackers to craft malicious XML requests that exploit the server’s processing capabilities.

By embedding external entities in XML payloads, threat actors can access sensitive files, disrupt services, or gain indirect control over internal systems. Given GeoServer’s widespread use in geospatial data management, the flaw poses significant risks, including data breaches, unauthorized system access, and potential service hijacking.

The issue highlights the dangers of improper XML parsing, where unchecked user input can lead to critical security gaps. While no active exploitation has been confirmed, the vulnerability underscores the need for immediate mitigation, particularly for organizations handling confidential geospatial datasets.

Security experts recommend enhanced input validation, restricted XML entity processing, and regular software updates to reduce exposure. Additionally, security audits and penetration testing can help identify and address similar weaknesses in GeoServer deployments. The discovery serves as a reminder of the evolving threats targeting data-driven applications.</description>
        <pubDate>Mon, 15 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/geosolutionsgroup/incident/GEO1765822581</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/GEO1765822581-geosolutionsgroup.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>D. E. Systems Ltd.: Cove Risk Services Data Breach Claims Investigated by Lynch Carpenter</title>
        <link>https://www.rankiteo.com/company/d--e--systems-ltd-/incident/D--1765844138</link>
        <description>ERS Data Breach Exposes Payment Card and Personal Information in Cybersecurity Incident

On December 15, 2025, Event Rental Systems (ERS) disclosed a cybersecurity breach involving unauthorized access to customer data. The incident occurred when an attacker injected malicious code into certain modules of ERS’s customer websites, potentially compromising sensitive information.

Affected data includes personally identifiable information (PII) such as contact details, payment card numbers, CVV codes, and expiration dates. The exact number of impacted individuals remains undisclosed.

Lynch Carpenter LLP, a national class action law firm, is investigating potential legal claims against ERS on behalf of those affected. The firm, which specializes in data privacy litigation, has urged individuals who received breach notifications in the past 30 days to seek legal review.

ERS has not provided further details on the breach’s scope, timeline, or remediation efforts. The incident highlights ongoing risks to payment processing systems and third-party integrations in the events industry.</description>
        <pubDate>Mon, 15 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/d--e--systems-ltd-/incident/D--1765844138</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/D--1765844138-d--e--systems-ltd-.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Notepad++ Fixes Updater Vulnerability Allowing Attackers to Hijack Update Traffic</title>
        <link>https://www.rankiteo.com/company/notepad-plus-plus/incident/NOT1765821620</link>
        <description>Notepad++ Patches Critical Update Hijacking Vulnerability

Notepad++, the widely used text and code editor, recently addressed a severe security flaw in its update mechanism that could allow attackers to hijack the update process. The vulnerability, stemming from insufficient file authentication in the Notepad++ updater, was identified by security researcher Kevin Beaumont.

The flaw enabled threat actors to intercept and manipulate update traffic, tricking the software into accepting malicious update files. Without proper verification, users risked downloading compromised updates, potentially leading to unauthorized access, data theft, or further exploitation.

In response, the Notepad++ development team implemented enhanced authentication measures to secure the updater utility. The patched version now prevents unauthorized modifications to update files, reducing the risk of exploitation. Users running older versions are urged to upgrade immediately to mitigate potential threats.

The incident underscores the importance of robust update verification in software distribution, particularly for widely adopted tools. While the vulnerability has been resolved, the discovery highlights ongoing risks in update mechanisms across applications.</description>
        <pubDate>Mon, 15 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/notepad-plus-plus/incident/NOT1765821620</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/NOT1765821620-notepad-plus-plus.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Harbourview Family Health Team: Exclusive: Harbour Town Doctors suffers alleged patient data breach</title>
        <link>https://www.rankiteo.com/company/harbourview-family-health-team/incident/HAR1765764164</link>
        <description>Rhysida Ransomware Group Claims Attack on Queensland Medical Centre, Threatens Patient Data Sale

The Rhysida ransomware group has listed Harbour Town Doctors, a Queensland-based medical centre, as a victim on its dark web extortion site. The attack was publicly claimed on December 11, with the group posting low-resolution images of allegedly stolen data, including files bearing the clinic’s letterhead, patient health summaries, medical record transfer requests, and pathology reports.

Rhysida set a seven-day ransom deadline and is currently offering the data for sale to a single buyer for five Bitcoin (approximately $137,000). The group stated that the data would be sold exclusively, with no resale permitted, framing it as a "unique opportunity" for potential buyers. Harbour Town Doctors has not responded to requests for comment.

About Rhysida
Rhysida is a ransomware-as-a-service (RaaS) operation, first observed in mid-2023, with 254 claimed victims to date. The financially motivated group, which communicates in Russian, has a history of targeting the healthcare sector. Notable past attacks include:
- Prospect Medical Holdings (August 2023): Disrupted 17 hospitals and 166 clinics in the U.S., exposing 500,000 Social Security numbers, medical records, and passport details.
- Sunflower Medical Group (January 2025): Allegedly stole three terabytes of data, impacting over 400,000 patients.
- Daughterly Care (September 2024): A Sydney-based aged-care provider, marking Rhysida’s previous Australian healthcare victim.

About Harbour Town Doctors
Located in Biggera Waters, Queensland, the clinic provides family medicine, skin cancer treatment, and chronic disease management, employing five doctors and administrative staff. The centre markets itself as offering personalised, team-based care through experienced healthcare professionals.</description>
        <pubDate>Sun, 14 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/harbourview-family-health-team/incident/HAR1765764164</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/HAR1765764164-harbourview-family-health-team.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Open Dealer Exchange: Wholesale used car prices edge higher, Pohanka Auto’s ‘no-appointment’ service model, 700Credit addresses data breach</title>
        <link>https://www.rankiteo.com/company/open-dealer-exchange-llc/incident/OPE1765801029</link>
        <description>700Credit Data Exposure Affects 5.6 Million Consumers

A significant data exposure at 700Credit, a provider of credit and compliance solutions for automotive dealers, has impacted 5.6 million consumers. The incident stemmed from a compromised partner system, which allowed attackers to exploit a 700Credit API to extract customer data tied to valid IDs.

While 700Credit’s production systems remained unbreached, the breach was isolated to the partner integration, highlighting vulnerabilities in third-party vendor security. The company is now working to contain the fallout, providing branded notices, helplines, and guidance to affected dealers to manage customer communications.

The incident underscores growing concerns over vendor oversight and data-security preparedness in the automotive retail sector. Dealers and consumers are expected to face heightened scrutiny as the industry assesses the broader implications of the exposure.</description>
        <pubDate>Sat, 13 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/open-dealer-exchange-llc/incident/OPE1765801029</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/OPE1765801029-open-dealer-exchange-llc.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>General Dynamics Information Technology: Beyond DSPM Dashboards: Why Data Movement Remains an Underrated Risk</title>
        <link>https://www.rankiteo.com/company/gdit/incident/GDI1765641604</link>
        <description>The Critical Gap in Data Security: Governing Data in Motion

Organizations have made significant progress in mapping their data landscapes, leveraging Data Security Posture Management (DSPM) tools to identify sensitive information, regulated records, and high-risk data concentrations. While visibility into data at rest has improved, a persistent blind spot remains: data in motion.

Once information leaves secure repositories—via email, file-sharing platforms, APIs, or web forms—governance often becomes fragmented. This disconnect stems from legacy architectures where storage and transmission systems evolved independently, each with distinct security models and workflows.

### The Core Challenge: Decentralized Movement and Fragmented Policies
Three key factors exacerbate this gap:

1. Decentralized Movement – Data flows through disparate channels (email, collaboration tools, automated workflows) without a unified control layer.
2. System-Centric Policies – Organizations enforce separate rules for email, file transfers, and partner access, but sensitive data doesn’t adhere to these boundaries.
3. Fractured Auditability – Tracking data movement requires piecing together logs from multiple systems, each with varying retention and detail levels.

### A Shift Toward Data-Centric Governance
A promising solution lies in treating data labels as actionable policy signals. Traditionally, classification (via MIP labels, custom taxonomies, or DSPM insights) has been confined to storage systems. However, for labels to mitigate risk, they must travel with the data and influence decisions across transmission platforms.

Recent integrations, such as the collaboration between BigID and Kiteworks, exemplify this shift. By connecting DSPM-driven classification with enforcement frameworks spanning email, file transfers, APIs, and web forms, organizations can enforce consistent policies regardless of how data moves.

### Impact on Managed Security Service Providers (MSSPs)
For MSSPs, this evolution presents opportunities to:

- Transform assessments into continuous programs by leveraging classification-driven enforcement for ongoing policy orchestration.
- Reduce policy sprawl by defining data-centric rules (e.g., "encryption required for external sharing of sensitive data") that apply uniformly across channels.
- Enhance third-party oversight with controls that persist beyond enterprise boundaries, improving supply-chain security.
- Accelerate incident response by providing immutable logs tied to data classifications, reducing investigation time and regulatory uncertainty.

### Real-World Applications
Connecting classification with enforcement addresses critical scenarios:

- Outbound sharing of regulated data – Applying consistent controls (encryption, watermarking, or blocking) when sensitive data leaves via email or file-sharing.
- Secure collaboration with partners – Retaining predictable controls for intellectual property, legal documents, or engineering files crossing organizational boundaries.
- High-risk data intake – Routing web form submissions through governed channels to enforce access, encryption, and audit requirements.
- Post-incident reconstruction – Using immutable logs to clarify data movement, reducing notification costs and regulatory friction.

### The Path Forward
Data governance is transitioning from a system-centric model ("protect the repository") to a data-centric approach ("protect the information wherever it goes"). While DSPM has advanced visibility, the next phase involves integrating classification with enforcement across communication, transfer, and collaboration channels. The BigID-Kiteworks partnership reflects this broader industry trend, demonstrating how discovery and enforcement can work together to create a more coherent, auditable, and scalable approach to data movement governance.</description>
        <pubDate>Sat, 13 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/gdit/incident/GDI1765641604</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/GDI1765641604-gdit.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>The Home Depot: Leaked Home Depot credential exposed internal systems for a year</title>
        <link>https://www.rankiteo.com/company/the-home-depot/incident/THE1765591280</link>
        <description>Home Depot Ignored Security Researcher’s Warning About Exposed Credential

Security researcher Vinny Troia (operating under the alias "Zimmerman") disclosed that Home Depot failed to respond to multiple alerts about a publicly exposed credential, despite his history of reporting similar vulnerabilities to other companies. Troia, who has previously notified organizations about security risks, stated that Home Depot was the only company to ignore his warnings.

The exposed credential was removed from public view only after TechCrunch reached out to Home Depot last week. The incident highlights potential gaps in the company’s vulnerability disclosure process, though no details were provided on whether the credential was misused or the extent of its exposure. The case underscores the risks of unaddressed security alerts in enterprise environments.</description>
        <pubDate>Sat, 13 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/the-home-depot/incident/THE1765591280</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/THE1765591280-the-home-depot.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>SITA: Travel Industry Urged to Double Down on Digital Transformation as Cyber Breaches Escalate</title>
        <link>https://www.rankiteo.com/company/sita/incident/SIT1765512742</link>
        <description>Aviation Industry Urged to Prioritize Cybersecurity Amid Rising Threats and IT Modernization

The aviation and travel sectors face a critical juncture as outdated IT systems strain under growing passenger volumes and escalating cyber threats, according to Martin Smillie, Senior Vice President of Communications and Data Exchange at SITA. Speaking at the launch of a new white paper on SITA Connect Go, Smillie emphasized the urgent need for secure, cloud-native infrastructure to ensure operational resilience and data protection.

A recent SITA Air Transport IT Insights report revealed that 66% of airlines and 73% of airports now rank cybersecurity among their top three priorities, reflecting the sector’s heightened vulnerability to digital attacks. The financial stakes are substantial—IBM estimates the average cost of a security breach at $4.44 million for large global companies.

Smillie stressed that the industry must move beyond reactive measures, embedding cybersecurity into core business strategy. Key steps include modernizing IT infrastructure, adopting cloud-native platforms, and implementing Secure Access Service Edge (SASE) networks to enhance visibility and incident response. SITA Connect Go, a purpose-built solution for air transport, exemplifies this shift by delivering secure, scalable connectivity that simplifies network architecture and reduces operational complexity.

With passenger demand surging and airports under increasing pressure, the industry’s IT spending is projected to reach $37 billion for airlines and $9 billion for airports in 2024. While innovations like biometrics, AI, and sustainable IT solutions are reshaping operations, Smillie warned that these advancements must be underpinned by robust security. As cyber threats grow in sophistication, the sector’s resilience hinges on infrastructure capable of evolving alongside emerging risks.

SITA Connect Go aims to future-proof operations by enabling real-time analytics, cost reduction, and seamless integration of next-generation technologies. Smillie framed the challenge as a defining moment for aviation: to meet the demands of a digitally connected world, the industry must prioritize cybersecurity at the heart of its transformation.</description>
        <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/sita/incident/SIT1765512742</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/SIT1765512742-sita.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Hypertension &amp; Nephrology, Inc.: Hypertension Nephrology Associates of Willow Grove agrees to $625K settlement following data breach, claim forms now available</title>
        <link>https://www.rankiteo.com/company/hypertension-&amp;-nephrology-inc./incident/HYP1765585076</link>
        <description>Hypertension Nephrology Associates Settles $625K Over 2024 Data Breach

Hypertension Nephrology Associates (HNA), a healthcare provider based in Willow Grove, Pennsylvania, has agreed to a $625,000 settlement to resolve a class action lawsuit stemming from a January 2024 data breach that exposed patients’ private health information. The settlement, preliminarily approved by the court on September 22, covers approximately 39,491 individuals across the U.S. who were notified their data was accessed, stolen, or compromised.

The lawsuit alleged HNA failed to adequately protect patient data and delayed notifying affected individuals, with the complaint describing the response as an "inexcusable delay" and "meager attempts" to mitigate the breach’s impact.

Under the settlement terms, class members may seek compensation in two ways:
- Documented loss payments of up to $5,000 for verified expenses (e.g., fraud-related costs, identity theft recovery) with supporting documentation.
- One-time cash payments, the amount of which will depend on the remaining settlement funds after documented claims and credit monitoring services are paid.

All class members are also entitled to two years of free credit monitoring and insurance services, regardless of whether they file a claim. Claim forms must be submitted online or postmarked by January 20, 2026, via the settlement website or mail. Final approval of the settlement will be decided at a February 18, 2026, court hearing, with payouts distributed afterward pending any appeals.</description>
        <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/hypertension-&amp;-nephrology-inc./incident/HYP1765585076</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/HYP1765585076-hypertension-&amp;-nephrology-inc..jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Cybercube: Ransomware keeps widening its reach</title>
        <link>https://www.rankiteo.com/company/cybercube/incident/CYB1765526320</link>
        <description>Ransomware Expands into New Sectors and Regions, With Public Sector at High Risk

A new report from CyberCube’s Global Threat Briefing for H2 2025 reveals that ransomware attacks are increasingly targeting sectors and regions previously considered lower-risk. The analysis, which examined incident patterns, threat actor behavior, and security postures, highlights a shifting landscape where attackers exploit weaker defensive baselines and slower adoption of security controls.

Ransomware incidents are growing fastest in regions with historically lower attack volumes, driven in part by the expansion of established groups like LockBit. The report underscores that threat actors are drawn to areas with less mature cybersecurity infrastructure, making it harder for organizations to anticipate emerging risks.

Industry comparisons show significant variation in defensive strength. While some sectors demonstrate strong security hygiene and fewer vulnerabilities, others exhibit weaker controls—such as exposed remote services, outdated software, and open ports—correlating with higher ransomware activity. Notably, security posture varies widely even within the same industry, meaning sector classification alone is not a reliable predictor of resilience.

The public sector emerges as a particularly high-risk target. The report finds that 53% of state and local government offices worldwide fall into a high-risk category for LockBit attacks, placing them among the most exposed groups in the dataset. Many public sector organizations struggle with inconsistent security practices, though some maintain robust defenses. The analysis groups these entities into risk clusters based on exposure and security posture:

- 16% exhibit both high exposure and weak security, making them prime targets due to slow patching and visible attack surfaces.
- 19% show high exposure but stronger controls, reducing the likelihood of successful ransomware deployment despite remaining attractive targets.
- The remaining organizations have lower exposure, where targeted improvements could yield faster risk reduction.

The report emphasizes that early indicators—such as rising negative cyber signals, shifting exposure patterns, and threat actor movement—can help forecast future attack trends. Ransomware growth often aligns with unpatched vulnerabilities, expanded attack surfaces, and delayed remediation, reinforcing the need for proactive monitoring and adaptive defenses.</description>
        <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/cybercube/incident/CYB1765526320</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/CYB1765526320-cybercube.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Victory Disability Data Breach Exposes Sensitive Patient Info</title>
        <link>https://www.rankiteo.com/company/victory-disability/incident/VIC1765825111</link>
        <description>Victory Disability Suffers Data Breach Exposing Sensitive Client Information

Victory Disability, a Pennsylvania-based law firm specializing in Social Security and VA disability claims, recently disclosed a data breach affecting current and former clients nationwide. The incident, detected in November 2025, involved unauthorized access to systems containing personally identifiable information (PII) and protected health information (PHI).

Between October 27 and November 12, 2025, an unknown party accessed portions of the firm’s network, potentially viewing or exfiltrating sensitive data. Exposed information includes names, contact details, government-issued IDs, Social Security numbers, dates of birth, health insurance details, and medical records.

Victory Disability launched an investigation with third-party cybersecurity experts and notified federal law enforcement and the Vermont and California Attorney Generals’ offices on December 12, 2025. The firm has since secured its systems and is monitoring the dark web for signs of leaked data.

To mitigate risks, affected individuals are being offered 24 months of complimentary credit monitoring and identity protection services. A dedicated call center (877-332-1724) has been established for inquiries. The full scope of the breach, including the number of impacted clients, remains undisclosed.</description>
        <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/victory-disability/incident/VIC1765825111</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/VIC1765825111-victory-disability.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Photobooth Supply Co: Photo Booth Website Bug Exposed Thousands of Users’ Photos</title>
        <link>https://www.rankiteo.com/company/photoboothsupplyco/incident/PHO1765565027</link>
        <description>Photo Booth Vendor’s Security Flaw Exposed Thousands of Private Images and Videos

A security researcher, known as Zeacer, uncovered a critical vulnerability in a photo booth vendor’s website that left thousands of images and videos—including intimate moments and drunken party snapshots—publicly accessible without authentication. The flaw stemmed from insecure direct object references, where media files were served via predictable URLs, allowing attackers to enumerate and download entire galleries using simple scripts.

The company had recently reduced file retention from two to three weeks to just 24 hours, limiting the volume of exposed content at any given time. However, this change did not prevent attackers from scraping daily uploads. At one point, over 1,000 images from a Melbourne-based photo booth service were visible, highlighting the scale of the risk.

The incident underscores the dangers of broken access control, ranked by OWASP as the top web application security risk. Event photo booths often capture highly personal moments—weddings, corporate events, and private gatherings—where sensitive details like home addresses, children’s faces, or organizational affiliations may be inadvertently exposed. Even with short retention periods, scraped data remains permanently accessible to attackers.

The financial and reputational consequences of such breaches can be severe. IBM’s Cost of a Data Breach Report estimates global breach costs in the multi-millions, while consumer-facing brands built on "shareable moments" face lasting reputational harm. The flaw likely resulted from common shortcuts in event-tech development, such as public object storage, client-side-only checks, and predictable URL patterns—issues that could have been mitigated with server-side protections like signed URLs, randomized IDs, and rate limiting.

Regulatory risks also loom large. Under Australia’s privacy laws, businesses must proactively secure data and disclose breaches, while GDPR in the EU and UK imposes fines of up to 4% of global turnover for serious violations. The vendor’s role—as either a data processor or controller—determines specific compliance obligations, but minimizing retention and enforcing strict access controls are baseline requirements.

Customers who used affected photo booths in the past month should assume potential exposure and request gallery deletions from vendors. Event organizers are advised to demand transparency from suppliers, including details on file retention, link security, and third-party audits like SOC 2 or ISO 27001. Contracts should explicitly address data processing terms and breach notification responsibilities.

The incident reflects a broader trend in event tech, where rapid growth often outpaces security hardening. As web app vulnerabilities remain a leading cause of data breaches, basic safeguards—such as private-by-default storage and continuous logging—can prevent such exposures without requiring complex solutions. While the vendor’s retention reduction limits immediate risk, it does not replace proper authentication and authorization, leaving galleries vulnerable to persistent scraping.</description>
        <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/photoboothsupplyco/incident/PHO1765565027</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/PHO1765565027-photoboothsupplyco.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>SoundCloud confirms breach after member data stolen, VPN access disrupted</title>
        <link>https://www.rankiteo.com/company/okta-inc-/incident/SOU1765850792</link>
        <description>SoundCloud Confirms Security Breach Impacting 28 Million Users

SoundCloud has confirmed that recent outages and VPN connectivity issues were caused by a security breach in which threat actors stole a database containing user information. The incident, detected over the past four days, led to widespread reports of users encountering 403 "forbidden" errors when accessing the platform via VPN.

In a statement to BleepingComputer, SoundCloud revealed that unauthorized activity was detected in an ancillary service dashboard, prompting the activation of its incident response procedures. While the company acknowledged that a threat actor accessed limited data, it clarified that no sensitive information—such as financial details or passwords—was compromised. The exposed data included only email addresses and publicly visible profile information.

The breach is estimated to affect approximately 20% of SoundCloud’s user base, translating to roughly 28 million accounts based on publicly reported figures. The company stated that all unauthorized access has been blocked and that no ongoing risk to the platform exists.

In response, SoundCloud has implemented additional security measures, including enhanced monitoring, improved threat detection, and a review of identity and access controls. However, a configuration change made during the response disrupted VPN access to the site, with no confirmed timeline for full restoration.

Following the breach, SoundCloud also faced denial-of-service (DoS) attacks that temporarily disabled its web availability. While the company has not identified the threat actor, BleepingComputer sources indicate that the ShinyHunters extortion gang is likely responsible. The group, which also claimed responsibility for a recent PornHub data breach, is reportedly attempting to extort SoundCloud after allegedly stealing user data. Further updates are expected as the investigation continues.</description>
        <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/okta-inc-/incident/SOU1765850792</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/SOU1765850792-okta-inc-.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>National Protective Security Authority (NPSA): UK Parliamentarians hit by Spear Phishing Attacks</title>
        <link>https://www.rankiteo.com/company/national-protective-security-authority/incident/NAT1765526560</link>
        <description>UK Parliament Confirms Cyberattacks Targeting MPs via WhatsApp and Signal

The UK government has officially acknowledged a surge in sophisticated cyberattacks targeting Members of Parliament (MPs) and government officials, with Russia identified as the primary suspect. Sir Lindsay Hoyle, Speaker of the House of Commons, recently disclosed that hackers have exploited messaging platforms like WhatsApp and Signal to conduct spear-phishing campaigns against parliamentarians.

The National Cyber Security Centre (NCSC), part of the UK’s GCHQ, confirmed the attacks, revealing that threat actors impersonate customer support representatives to trick victims into compromising their accounts. MPs receive fraudulent messages claiming their WhatsApp accounts face suspension, prompting them to follow malicious instructions—leading to malware installation, account hijacking, or financial theft.

This revelation follows an MI5 alert about Chinese nationals attempting to interfere in UK parliamentary processes through "Pig Butchering" investment scams, highlighting the growing sophistication of state-sponsored cyber operations. Messaging platforms, once considered secure, are now prime targets due to their widespread use and the ease of impersonation.

While Meta has deployed AI-driven defenses to combat fraud, attackers continuously adapt, evading automated protections. The UK’s response—including NCSC advisories and direct warnings from Hoyle—underscores the escalating threat of digital espionage in global geopolitics. As cyberattacks evolve, the government’s ability to safeguard its digital infrastructure remains a critical challenge.</description>
        <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/national-protective-security-authority/incident/NAT1765526560</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/NAT1765526560-national-protective-security-authority.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Orange Madagascar: New Android Malware Locks Device Screens and Demands a Ransom</title>
        <link>https://www.rankiteo.com/company/orange-madagascar/incident/ORA1765576841</link>
        <description>New Android Malware "DroidLock" Targets Spanish Users with Ransomware-Like Tactics

Researchers at Zimperium have uncovered a sophisticated Android malware, dubbed DroidLock, capable of locking device screens, demanding ransom payments, and executing full device takeovers. The malware, which exhibits ransomware-like behavior, also wipes data, alters PINs, intercepts one-time passwords (OTPs), and remotely controls infected devices.

The campaign primarily targeted Spanish Android users through phishing sites, with attackers impersonating Orange S.A., a French telecommunications company. Once installed, DroidLock employs deceptive system update screens to trick victims into granting critical permissions, including Device Admin and Accessibility Services. These permissions enable the malware to perform malicious actions such as factory resets, device locking, PIN changes, and unauthorized access to SMS, call logs, and contacts.

The infection begins with a dropper that prompts users to enable unknown app installations, followed by a secondary payload that exploits accessibility permissions to automate further malicious actions. DroidLock uses two key overlay techniques—Lock Pattern (to capture unlock patterns) and WebView (to display attacker-controlled HTML content)—to manipulate user interactions. It also deploys a fake update screen to prevent users from interrupting its operations.

Additionally, the malware operates as a persistent foreground service, capturing screen activity via MediaProjection and VirtualDisplay, then transmitting the data to a command-and-control (C2) server. This functionality poses a severe risk, potentially exposing credentials, multi-factor authentication (MFA) codes, and other sensitive information.

Zimperium has shared its findings with Google, ensuring protection for up-to-date Android devices. Indicators of Compromise (IoCs) for DroidLock have also been published to aid detection and mitigation.</description>
        <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/orange-madagascar/incident/ORA1765576841</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/ORA1765576841-orange-madagascar.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>East Texas Behavioral Healthcare Network: Heart of Texas Behavioral Health Network Data Breach</title>
        <link>https://www.rankiteo.com/company/etbhn/incident/ETB1765578002</link>
        <description>Heart of Texas Behavioral Health Network Reports Data Breach Affecting 1,309 Individuals

The Heart of Texas Behavioral Health Network (HOTBHN), a Central Texas nonprofit serving mental health and intellectual/developmental disabilities, disclosed a data breach impacting 1,309 individuals. The incident, reported to the Texas Attorney General’s office on December 12, 2025, exposed sensitive personal and medical data, including names, addresses, Social Security numbers, dates of birth, health insurance details, and protected health information (PHI).

The breach’s exact cause and responsible party remain undisclosed, but the scope of compromised data suggests a significant security failure within HOTBHN’s systems. The exposure of personally identifiable information (PII) and PHI heightens risks of identity theft and medical fraud for affected individuals.

While HOTBHN has not released specific response measures or support resources for those impacted, organizations typically advise affected parties to monitor credit reports, place fraud alerts, and watch for suspicious activity related to medical or insurance records. Further details on the breach’s origin and mitigation efforts are pending.</description>
        <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/etbhn/incident/ETB1765578002</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/ETB1765578002-etbhn.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>SK Telecom: (3rd LD) Science minister vows punitive fines against companies with repeated security breaches</title>
        <link>https://www.rankiteo.com/company/sk-telecom/incident/SK-1765527019</link>
        <description>South Korea to Impose Punitive Fines on Companies with Repeated Data Breaches

South Korea’s Ministry of Science and ICT has announced plans to introduce stricter penalties for businesses that experience repeated data breaches, following a series of high-profile incidents in 2025. During a policy briefing with President Lee Jae Myung in Sejong on December 12, Science Minister Bae Kyung-hoon outlined measures to enhance cybersecurity accountability, including fines of up to 3% of a company’s annual sales for repeat offenders.

The proposal follows breaches at major firms like SK Telecom, KT Corp., and Coupang, which exposed the personal data of millions of South Koreans. Under the new regulations, fines for delayed breach reporting will increase to ₩50 million (US$339,000), up from ₩30 million. The government will also codify CEO accountability and empower chief security officers to enforce compliance. Additionally, companies’ security capabilities will be publicly assessed to incentivize stronger protections.

Beyond cybersecurity, the ministry unveiled ambitious AI and technology initiatives, including the development of one of the world’s top 10 AI models by 2026, which will be open-sourced for defense, manufacturing, and cultural applications. The K-Moonshot project aims to close the technology gap with the U.S., targeting 85% of its advanced level by 2030—up from 81.5% in 2022. Key focus areas include humanoid robots, next-generation chips, and clean energy, backed by a ₩5.9 trillion (US$4 billion) investment in strategic sectors like bio, quantum, and nuclear fusion.

South Korea also plans to become an AI hub in the Asia-Pacific region, attracting talent and startups while expanding AI integration in manufacturing, logistics, and shipbuilding. International collaborations will include AI research with the U.S. and robotics partnerships with China. The government will allocate 10% of its R&amp;D budget to basic science and aims to develop a private-sector-led small modular reactor by 2030, supported by a ₩1.2 trillion budget.</description>
        <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/sk-telecom/incident/SK-1765527019</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/SK-1765527019-sk-telecom.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>ASRC Federal: The 2025 Cybersecurity Reckoning: From Optional to Mandatory</title>
        <link>https://www.rankiteo.com/company/asrc-federal/incident/ASR1765600751</link>
        <description>2025: The Year Cybersecurity Became Non-Negotiable

In 2025, cybersecurity evolved from a recommended best practice to an operational necessity, driven by three pivotal events that exposed the limitations of fragmented security tools and reactive defenses.

### 1. CMMC Enforcement: A Wake-Up Call for Compliance
On November 10, 2025, the U.S. Department of Defense made CMMC (Cybersecurity Maturity Model Certification) compliance mandatory for all defense contracts—with no grace period. Despite years of warnings, the industry was unprepared:
- 99% of contractors failed to meet requirements.
- 40% had not completed self-assessments.
- Basic protections like MFA (27%), patch management (22%), and secure backups (29%) were widely absent.
The crisis revealed that simply purchasing security tools is ineffective without coordinated implementation and technical leadership.

### 2. Salt Typhoon: Cyber Espionage as a National Security Threat
The FBI uncovered "Salt Typhoon," a Chinese state-sponsored campaign active since at least 2019. The operation:
- Compromised telecommunications networks in 80+ countries.
- Targeted backbone routers to infiltrate critical infrastructure, including energy, water, and transportation systems.
- Notified over 200 U.S. organizations of state-sponsored breaches.
The campaign demonstrated that cyber threats are no longer just data risks—they are tools for intelligence gathering and operational disruption, blurring the line between cybersecurity and national defense.

### 3. Government Shutdown: A Window for Adversaries
A prolonged 2025 government shutdown crippled U.S. cyber defenses:
- CISA furloughed 65% of its staff, leaving only 889 employees to manage federal cybersecurity.
- The Cybersecurity Information Sharing Act lapsed, severing critical public-private coordination.
- Attackers exploited the chaos, spoofing government emails and weaponizing unpatched vulnerabilities while contractors were offline.
The shutdown proved that adversaries actively exploit coordination gaps, turning disruptions into attack opportunities.

### The Shift to Integrated Security
By 2025, the speed of zero-day exploitation—now deployed within hours of disclosure—rendered traditional reactive security obsolete. Organizations must now prioritize unified security programs that:
- Consolidate accountability under a single governance structure.
- Embed compliance and governance as core requirements, not optional add-ons.
- Focus on measurable outcomes rather than disjointed tools.

The events of 2025 made one thing clear: fragmented security strategies are no longer viable. The future belongs to integrated, proactive defenses.</description>
        <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/asrc-federal/incident/ASR1765600751</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/ASR1765600751-asrc-federal.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Google Threat Research Uncovers Data Breach in NHS Linked to Oracle Vulnerability</title>
        <link>https://www.rankiteo.com/company/nhs/incident/NHS1765823332</link>
        <description>NHS Hit by Major Cyberattack: Clop Ransomware Gang Exploits Oracle Vulnerability, Exposes 168,000 Files

Google Threat Research has uncovered a severe cybersecurity breach targeting the UK’s National Health Service (NHS), orchestrated by the Clop ransomware gang. The attack, linked to a vulnerability in Oracle software used by the NHS and UK Treasury, resulted in the exposure of over 168,000 files, which were later leaked on the dark web.

The breach compromised sensitive medical data, including records of high-profile individuals such as members of the British and Foreign Royal Families, Attorney Generals, and House of Lords officials. Particularly alarming was the exposure of personal health details, including cancer treatment records of Royal Household members, adding a layer of political and public sensitivity to the incident.

The vulnerability in Oracle’s software was first flagged by the UK’s National Cyber Security Centre (NCSC) in September 2023, with warnings about its potential for exploitation. Despite early alerts, the attack went undetected until the data was leaked, raising concerns about the security of critical infrastructure. The Clop gang, known for targeting healthcare organizations, exploited the flaw in a calculated move, with fears that other high-value targets, such as the UK Treasury, could be next.

Oracle has since issued a patch to address the vulnerability, and the UK Ministry of Defense confirmed that the flaw has been fixed. The NHS has stated it will not comply with ransom demands, adhering to UK law, which prohibits payments to cybercriminals. However, the full scope of the breach remains unclear, as authorities investigate whether all leaked files belong to NHS patients or include data from other affected systems.

The incident underscores the growing threat to public health infrastructure, which has become a prime target for ransomware groups. While the NHS has moved to contain the damage, the breach highlights the need for stronger security measures and proactive threat detection. The exposure of high-profile individuals’ data further amplifies concerns about the protection of sensitive information across government sectors.

Investigations are ongoing, with cybersecurity experts analyzing the Clop gang’s methods and assessing the long-term impact on public trust in the NHS and broader UK public services. The attack serves as a stark reminder of the risks posed by sophisticated cyber threats to critical digital infrastructure.</description>
        <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/nhs/incident/NHS1765823332</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/NHS1765823332-nhs.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>DFS Aviation Services GmbH: Germany Blames Russia for Cyberattack on Air Safety, Election Interference</title>
        <link>https://www.rankiteo.com/company/dfs-aviation-services/incident/DFS1765591851</link>
        <description>Germany Accuses Russia of Cyberattack on Air Traffic Control and Election Interference

Germany has formally attributed a cyberattack on its air traffic control systems and a disinformation campaign targeting its 2024 federal election to Russia’s military intelligence agency, the GRU. In a press briefing on Friday, a German Foreign Ministry spokesman stated that intelligence services had "clearly identified" the involvement of the hacker group APT28 (Fancy Bear), a collective linked to the GRU, in an August 2024 attack on German Air Safety.

The spokesman also confirmed that Russia orchestrated the Storm 1516 campaign, a coordinated effort to influence the February parliamentary election—won by Chancellor Friedrich Merz’s conservatives, with the far-right AfD securing its highest-ever result. The campaign disseminated deepfake content and fabricated claims about prominent politicians, including Merz, former Foreign Minister Annalena Baerbock, and former Vice Chancellor Robert Habeck, aiming to erode public trust in democratic institutions.

German intelligence identified pro-Russian influencers, conspiracy theorists, and far-right extremists as key amplifiers of the disinformation. Fact-checking efforts by AFP’s German service debunked false narratives, including claims that AfD ballots were excluded in Leipzig and votes for the party were destroyed in Hamburg.

Russia’s embassy in Berlin dismissed the accusations as "baseless and absurd," while German officials emphasized they possessed "absolutely solid proof" of Moscow’s involvement. The head of Germany’s domestic intelligence agency, BfV, warned that such operations represent a direct attack on the country’s democratic order.

In response, Germany announced plans to impose EU-wide sanctions on hybrid actors and enhance Schengen Area travel monitoring for Russian diplomats starting in January to mitigate intelligence risks. The move aligns with broader European concerns over Russian espionage, sabotage, and cyber threats, particularly as Germany remains a leading supporter of Ukraine amid the ongoing war.</description>
        <pubDate>Fri, 12 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/dfs-aviation-services/incident/DFS1765591851</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/DFS1765591851-dfs-aviation-services.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>South Country Health Alliance: Wabasha County officials issue warning about data breach</title>
        <link>https://www.rankiteo.com/company/south-country-health-alliance/incident/SOU1765499305</link>
        <description>Wabasha County Data Breach Exposes Resident Information via Emergency Notification System

Wabasha County, Minnesota, officials disclosed a data breach affecting its emergency notification system, OnSolve CodeRED, after a forensic investigation confirmed unauthorized access by an organized cybercriminal group. The incident, first reported to the county’s emergency management office in November, involved the potential exfiltration of user data, including names, addresses, email addresses, phone numbers, and passwords tied to the CodeRED platform.

In a December 10 Facebook statement, the Wabasha County Sheriff’s Office revealed that the compromised system had been disabled and that the county is transitioning to an upgraded emergency notification system. While the investigation remains ongoing, officials urged residents who reused the exposed CodeRED password for other accounts to update their credentials immediately.

The breach highlights vulnerabilities in third-party emergency alert systems, raising concerns about the security of sensitive resident data. Wabasha County Emergency Management Director Brenda Tomlinson is available for further inquiries at 651-565-3069 or via email.</description>
        <pubDate>Thu, 11 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/south-country-health-alliance/incident/SOU1765499305</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/SOU1765499305-south-country-health-alliance.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Walmart USA: Indiana and Kentucky Data Privacy Rules You Need to Know</title>
        <link>https://www.rankiteo.com/company/walmart-usa/incident/WAL1765485419</link>
        <description>Cybersecurity Alert: Data Breach Exposes Risks of Weak Passwords and Consumer Data Vulnerabilities

A recent incident highlights the growing threat of credential-stuffing attacks and the broader risks of unsecured personal data. In early 2024, an individual began receiving suspicious "subscription confirmation" emails from multiple retailers, followed by a fraudulent Walmart pickup order notification. Upon investigation, the victim discovered that hackers had accessed their account using a compromised password—likely obtained from a prior data breach—and attempted to purchase high-value items, including electronics and groceries.

The attack underscores a common tactic: hackers exploit reused passwords across platforms, flooding victims with distracting emails to mask fraudulent activity. While the victim canceled the order and reported the incident, law enforcement noted that such crimes often go unsolved due to the difficulty of tracking perpetrators.

The breach also reignited discussions about data privacy, as personal information—from shopping habits to medical records—is routinely collected, sold, and exploited by businesses and cybercriminals alike. Indiana Attorney General Todd Rokita emphasized the pervasive nature of data tracking, stating that "every click, purchase, and search" is monetized, often without consumer awareness.

To address these concerns, the Consumer Data Protection Act, passed in 2023 and set to take effect January 1, 2026, aims to strengthen protections for Indiana and Kentucky residents. Key provisions include:
- The right to request data deletion, opt out of targeted advertising, and access collected personal information.
- Restrictions on processing children’s data or sensitive information (e.g., health records, biometrics) without explicit consent.
- Prohibitions against penalizing consumers for exercising these rights.

The law targets businesses handling large-scale data or selling personal information but exempts government agencies, financial institutions, healthcare providers under HIPAA, nonprofits, and utilities. Some lawmakers are pushing to refine enforcement language before the 2026 implementation.

The incident serves as a reminder of the cascading risks posed by weak password hygiene and the urgent need for stronger data safeguards.</description>
        <pubDate>Thu, 11 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/walmart-usa/incident/WAL1765485419</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/WAL1765485419-walmart-usa.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>PSafe US: DroidLock malware locks you out of your Android device and demands ransom</title>
        <link>https://www.rankiteo.com/company/psafeus/incident/PSA1765476395</link>
        <description>New Android Ransomware Campaign Targets Spanish-Speaking Users with DroidLock Malware

Researchers have uncovered an active threat campaign distributing DroidLock, a sophisticated Android ransomware strain that hijacks devices and demands payment under threats of data destruction. While the campaign has primarily targeted Spanish-speaking users, experts warn it could expand to other regions.

How DroidLock Infects Devices
The malware spreads via phishing sites that impersonate trusted brands, such as telecom providers, tricking victims into downloading a malicious app. Once installed, the app acts as a dropper, exploiting Device Admin and Accessibility Services permissions to gain full control. After securing accessibility access, DroidLock autonomously approves additional permissions—including SMS, call logs, contacts, and audio—to strengthen its leverage for extortion.

Capabilities and Attack Tactics
DroidLock employs Accessibility Services to overlay fake screens, such as a fraudulent Android update prompt, while secretly capturing device unlock patterns and app credentials. Using Virtual Network Computing (VNC), attackers gain real-time remote control, enabling them to:
- Change device PINs to lock users out
- Intercept one-time passwords (OTPs)
- Manipulate notifications, mute audio, or uninstall apps
- Activate the camera for surveillance
- Wipe the device if ransom demands aren’t met

Unlike traditional ransomware, DroidLock does not encrypt files but instead blocks access and threatens permanent data deletion unless payment is made within 24 hours. Victims receive a ransom note with an email contact and device ID, accompanied by countdown timers and warnings against involving authorities or recovery tools.

Researchers’ Findings
Security firm Zimperium highlighted the malware’s ability to bypass security measures and escalate privileges rapidly. The campaign’s success in Spain may prompt its expansion to other markets, raising concerns about its potential global reach.</description>
        <pubDate>Thu, 11 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/psafeus/incident/PSA1765476395</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/PSA1765476395-psafeus.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Rainbird Technologies: Rain Bird Data Breach Exposes Financial Info of 24,862 Customers</title>
        <link>https://www.rankiteo.com/company/rainbird-technologies-ltd/incident/RAI1765556736</link>
        <description>Rain Bird Corporation Reports Data Breach Affecting 24,862 U.S. Customers

On December 11, 2025, Rain Bird Corporation, a global leader in irrigation products and services, disclosed a data breach impacting its online web store. The incident exposed payment card details for 24,862 individuals in the U.S., including 40 residents of Maine.

The breach was first detected on July 25, 2025, after Rain Bird identified suspicious activity within its web store systems. A subsequent investigation, conducted with third-party cybersecurity experts, revealed that unauthorized actors had accessed payment card information used in transactions between February 11 and September 5, 2025. The compromised data included names, credit card numbers, CVV codes, and associated access codes.

Rain Bird completed its review of the affected data in December and began notifying impacted individuals by mail. On December 10, 2025, the company filed breach notifications with the Attorney Generals’ offices in California, Maine, and Vermont.

In response, Rain Bird secured its systems, engaged external cybersecurity specialists to assess the breach’s scope, and notified regulators and credit reporting agencies. To assist affected customers, the company is offering 12 months of complimentary credit monitoring and identity restoration services through Cyberscout, a TransUnion subsidiary. A dedicated call center (833-971-2302) has been established for inquiries.</description>
        <pubDate>Thu, 11 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/rainbird-technologies-ltd/incident/RAI1765556736</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/RAI1765556736-rainbird-technologies-ltd.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Barracuda: .NET Framework Vulnerability SOAPwn: Impact on Enterprise Applications</title>
        <link>https://www.rankiteo.com/company/barracuda-networks/incident/BAR1765454547</link>
        <description>New .NET Framework Vulnerability "SOAPwn" Exposes Enterprises to Remote Code Execution Risks

Security researchers at WatchTowr Labs have uncovered a critical vulnerability in the .NET Framework, dubbed "SOAPwn", which enables remote code execution (RCE) through an invalid cast flaw in serialization processes. The vulnerability poses a severe threat to enterprise infrastructure, with known impacts on applications such as Barracuda Service Center RMM, Ivanti Endpoint Manager (EPM), and Umbraco 8. However, due to the widespread use of .NET in enterprise environments, the risk extends across multiple industries.

The flaw stems from improper type handling during .NET serialization, allowing attackers to execute arbitrary code on vulnerable systems. Successful exploitation could lead to full system compromise, exposing sensitive data and disrupting critical operations.

Organizations using affected applications are urged to monitor vendor advisories and apply patches immediately. Additional mitigation strategies include code audits, network segmentation, and enhanced security monitoring via IDS and SIEM tools. The discovery underscores the need for proactive vulnerability management and collaboration with security researchers to address emerging threats.</description>
        <pubDate>Thu, 11 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/barracuda-networks/incident/BAR1765454547</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/BAR1765454547-barracuda-networks.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data</title>
        <link>https://www.rankiteo.com/company/google/incident/GOO1765461915</link>
        <description>GeminiJack: Google Patches Critical Zero-Click Exploit Targeting Enterprise Systems

A newly discovered zero-click vulnerability, dubbed GeminiJack, posed a severe threat to corporate data security by enabling attackers to infiltrate enterprise systems without any user interaction. The exploit leveraged flaws in how applications processed emails, calendar invites, and documents, allowing malicious actors to execute remote code or exfiltrate sensitive information.

Unlike traditional attacks requiring user engagement, GeminiJack bypassed security measures entirely, making it particularly dangerous. Delivery methods included manipulated email processing, malicious calendar invitations, and embedded code in document files—all exploiting weaknesses in data-handling protocols.

Google responded swiftly, deploying a security patch across affected enterprise applications, enhancing monitoring systems, and reinforcing data protection protocols. The company’s proactive measures aimed to neutralize the threat and prevent similar exploits.

The incident underscores the growing sophistication of cyber threats, particularly zero-click exploits, which demand rapid vulnerability identification and mitigation. Enterprises are urged to adopt multi-layered security strategies, including regular software updates, risk assessments, and advanced intrusion detection, to defend against evolving attack vectors. The GeminiJack case serves as a critical reminder of the need for continuous vigilance in enterprise cybersecurity.</description>
        <pubDate>Thu, 11 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/google/incident/GOO1765461915</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/GOO1765461915-google.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Services Australia may get powers to rein in data breach exposure</title>
        <link>https://www.rankiteo.com/company/services-australia/incident/SER1765340155</link>
        <description>Services Australia Seeks New Powers to Compel Third-Party Breach Disclosures Amid Rising Cyber Threats

Services Australia, which manages data for 27.5 million Australians, is pushing for expanded authority to require third parties to disclose breaches involving government identifiers, such as Medicare and Centrelink numbers. The move follows a dramatic surge in notifiable data breaches—from seven in 2022–23 to 82 in 2024–25—primarily driven by phishing attacks where individuals unknowingly shared credentials with impersonators.

While the agency established response plans after the 2022 Optus and Medibank breaches, it currently lacks legal power to compel third parties to report incidents involving its identifiers. A federal audit recommended legislative reforms to mandate timely notifications, with support from the Attorney-General’s Department and the Office of the Australian Information Commissioner (OAIC).

The audit also revealed systemic delays in breach reporting: 71% of the 165 notifiable data breaches (NDBs) reported to the OAIC between 2018–19 and 2024–25 were disclosed 50 or more days after detection. Internal reviews dating back to 2023 found Services Australia frequently missed the 30-day statutory assessment deadline, though the agency claims to have addressed these gaps by October 2023.

In June 2025, Services Australia introduced a new "data breach mailout service" to directly notify affected individuals via mail or digital channels, though its effectiveness remains under evaluation. The proposed reforms aim to close gaps in breach transparency, particularly where third-party custodians hold sensitive government-linked data.</description>
        <pubDate>Wed, 10 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/services-australia/incident/SER1765340155</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/SER1765340155-services-australia.jpg" type="image/jpeg" />
    </item>
    <item>
        <title>Show Creators Studios: Coupang Faces U.S. Lawsuit Over Data Breach</title>
        <link>https://www.rankiteo.com/company/show-creators-inc/incident/SHO1765339395</link>
        <description>Cyberattack Disrupts Major U.S. Healthcare Network, Exposing Patient Data

A ransomware attack on Change Healthcare, a key subsidiary of UnitedHealth Group, has severely disrupted operations across the U.S. healthcare system, causing widespread delays in prescription processing, insurance claims, and patient care. The incident, first detected on February 21, 2024, forced the company to take critical systems offline, affecting pharmacies, hospitals, and clinics nationwide.

The attack has been attributed to the BlackCat (ALPHV) ransomware group, which claimed responsibility and allegedly exfiltrated sensitive data, including patient records and financial information. While UnitedHealth has not confirmed the extent of the breach, reports suggest the hackers may have stolen terabytes of data, raising concerns about potential identity theft and fraud.

The fallout has been substantial: pharmacies reported delays in filling prescriptions, healthcare providers struggled with billing disruptions, and some patients faced out-of-pocket costs for medications. The American Hospital Association (AHA) warned of "significant financial strain" on providers, with some smaller clinics at risk of closure due to cash flow interruptions.

UnitedHealth has since restored some services, but full recovery remains ongoing. The incident underscores the growing threat of ransomware to critical infrastructure, particularly in healthcare, where delays can directly impact patient safety. Federal agencies, including the HHS and FBI, are investigating the attack, while lawmakers have called for stricter cybersecurity regulations in the sector.</description>
        <pubDate>Wed, 10 Dec 2025 00:00:00 +0000</pubDate>
        <author>Rankiteo.com</author>
        <guid isPermaLink="true">https://www.rankiteo.com/company/show-creators-inc/incident/SHO1765339395</guid>
        <enclosure url="https://static.rankiteo.com/incident-score/SHO1765339395-show-creators-inc.jpg" type="image/jpeg" />
    </item>
    </channel>
</rss>