<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>ZERO|TOLERANCE - Breach Intelligence</title><description>Cybersecurity breach analyses, threat intelligence, and data exposure research across MENA, Europe, and the United States.</description><link>https://zerotolerance.me/</link><language>en-us</language><item><title>FBI: China-Linked Hackers Breach Wiretap Surveillance System in &apos;Major Incident&apos;</title><link>https://zerotolerance.me/cyberthreats/fbi-dcs3000-surveillance-breach-china-salt-typhoon/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/fbi-dcs3000-surveillance-breach-china-salt-typhoon/</guid><description>FBI&apos;s DCS-3000 pen register system compromised via ISP vendor supply chain. Surveillance target phone numbers and PII exposed.</description><pubDate>Sun, 05 Apr 2026 00:00:00 GMT</pubDate><category>nation-state</category></item><item><title>LinkedIn: Covert Browser Extension Scanning Program Targets 6,236 Extensions and Fingerprints Visitors&apos; Devices</title><link>https://zerotolerance.me/cyberthreats/linkedin-browsergate-extension-scanning/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/linkedin-browsergate-extension-scanning/</guid><description>LinkedIn deployed hidden JavaScript scanning visitors for 6,236 browser extensions - including 200+ competitors - while harvesting device telemetry.</description><pubDate>Fri, 03 Apr 2026 00:00:00 GMT</pubDate><category>surveillance-privacy</category></item><item><title>Cisco Systems: ShinyHunters Claim 3M Salesforce Records, 300+ GitHub Repos, and AWS Data in Triple-Vector Extortion</title><link>https://zerotolerance.me/cyberthreats/cisco-shinyhunters-salesforce-aws-trivy-breach/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/cisco-shinyhunters-salesforce-aws-trivy-breach/</guid><description>ShinyHunters claims 3M Salesforce records, 300+ GitHub repos, and AWS data from three breach vectors in a triple-vector extortion against Cisco.</description><pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>USPTO GovDelivery Scam: How Fraudsters Weaponize Real .gov Emails to Steal From Trademark Filers</title><link>https://zerotolerance.me/cyberthreats/uspto-govdelivery-trademark-scam-investigation-2026/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/uspto-govdelivery-trademark-scam-investigation-2026/</guid><description>Fraudsters weaponize the USPTO&apos;s real GovDelivery email system as a social engineering prop during live phone scams targeting trademark filers. 77,000+ victims.</description><pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate><category>enforcement</category></item><item><title>Axios npm Hijack: North Korea&apos;s UNC1069 Weaponized 100M Weekly Downloads via Social Engineering and WAVESHAPER.V2 RAT</title><link>https://zerotolerance.me/cyberthreats/axios-npm-supply-chain-attack-2026/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/axios-npm-supply-chain-attack-2026/</guid><description>North Korea&apos;s UNC1069 social-engineered the lead Axios maintainer, hijacking npm and GitHub accounts to deploy the WAVESHAPER.V2 RAT via 100M weekly downloads.</description><pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate><category>supply-chain</category></item><item><title>Passaic County, NJ: Medusa Ransomware Disables Government Services for 526,000 Residents</title><link>https://zerotolerance.me/cyberthreats/passaic-county-medusa-ransomware-2026/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/passaic-county-medusa-ransomware-2026/</guid><description>Medusa ransomware knocked out Passaic County phone lines and IT systems. $800K ransom demanded. Same group that shut down UMMC&apos;s 35 clinics.</description><pubDate>Wed, 04 Mar 2026 00:00:00 GMT</pubDate><category>ransomware</category></item><item><title>Lacoste: Lapsus$ Returns from Law Enforcement Dismantlement to Breach French Luxury Giant</title><link>https://zerotolerance.me/cyberthreats/lacoste-lapsus-data-breach-2026/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/lacoste-lapsus-data-breach-2026/</guid><description>Lapsus$ - the extortion group whose core members were arrested and convicted in 2022-2023 - claimed Lacoste as a victim, stealing source code.</description><pubDate>Wed, 07 Jan 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>INTERPOL Operation Synergia III: 45,000 Malicious IPs Dismantled, 94 Arrested Across 72 Countries</title><link>https://zerotolerance.me/cyberthreats/interpol-synergia-iii-takedown-2026/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/interpol-synergia-iii-takedown-2026/</guid><description>INTERPOL&apos;s largest coordinated cyber takedown of 2026 dismantled 45,000+ malicious IPs, arrested 94 suspects, and seized 212 devices across 72 countries.</description><pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate><category>enforcement</category></item><item><title>Oracle&apos;s Dual Breach: 6M Cloud SSO Records Stolen, 80 Hospitals Compromised - and a Denial That Collapsed Under Evidence</title><link>https://zerotolerance.me/cyberthreats/oracle-cloud-health-dual-breach-2025/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/oracle-cloud-health-dual-breach-2025/</guid><description>Passport scans of 700+ VIP attendees leaked - former UK PM David Cameron, Binance CEO, hedge fund billionaires. Open cloud storage, zero authentication.</description><pubDate>Fri, 21 Mar 2025 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>Conduent/SafePay: 25M Americans Exposed in 84-Day Ransomware Dwell - Largest US Government Data Breach</title><link>https://zerotolerance.me/cyberthreats/conduent-safepay-ransomware-25m-breach/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/conduent-safepay-ransomware-25m-breach/</guid><description>SafePay ransomware operators spent 84 days inside Conduent&apos;s network, exfiltrating 8.5TB of data affecting 25M+ Americans across 30+ states.</description><pubDate>Mon, 13 Jan 2025 00:00:00 GMT</pubDate><category>ransomware</category></item><item><title>TriZetto/Cognizant: 3.4M Patient Records Stolen in 11-Month Healthcare Supply Chain Breach</title><link>https://zerotolerance.me/cyberthreats/trizetto-cognizant-healthcare-breach-2025/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/trizetto-cognizant-healthcare-breach-2025/</guid><description>An unauthorized actor accessed TriZetto&apos;s eligibility verification portal for 11 months, stealing SSNs and medical data belonging to 3.4M patients.</description><pubDate>Fri, 06 Feb 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>GlassWorm: 433 Compromised Components Across VSCode, GitHub, and npm - Self-Propagating Worm Spans Four Developer Ecosystems</title><link>https://zerotolerance.me/cyberthreats/glassworm-supply-chain-campaign-2026/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/glassworm-supply-chain-campaign-2026/</guid><description>A Russian-speaking actor deployed GlassWorm across 433 components in four developer ecosystems using invisible Unicode payloads and Solana blockchain C2.</description><pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate><category>supply-chain</category></item><item><title>Infinite Campus: ShinyHunters Breach K-12 Platform Serving 11M Students via 10-Minute Vishing Attack</title><link>https://zerotolerance.me/cyberthreats/infinite-campus-shinyhunters-k12-breach/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/infinite-campus-shinyhunters-k12-breach/</guid><description>ShinyHunters vished an Infinite Campus employee, bypassed MFA in real time, and exported Salesforce customer directory data in a 10-minute attack window.</description><pubDate>Wed, 18 Mar 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>Crunchyroll: 6.8M Users Exposed After Infostealer Malware Compromises TELUS Support Agent&apos;s Okta Credentials</title><link>https://zerotolerance.me/cyberthreats/crunchyroll-telus-okta-shinyhunters-breach/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/crunchyroll-telus-okta-shinyhunters-breach/</guid><description>A phishing email delivered infostealer malware to a TELUS Digital support agent in India, capturing Okta SSO credentials that unlocked Crunchyroll&apos;s.</description><pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>Lloyds Banking Group: API Race Condition Exposes 447,936 Customers&apos; NI Numbers, Account Data in 4-Hour Mobile App Failure</title><link>https://zerotolerance.me/cyberthreats/lloyds-banking-group-api-race-condition-data-exposure/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/lloyds-banking-group-api-race-condition-data-exposure/</guid><description>A software defect in an overnight API update broke transaction isolation across Lloyds, Halifax, and Bank of Scotland mobile apps for 4 hours and 40.</description><pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>UK Companies House: Browser Back Button Exposes 5.43M Companies&apos; Directors&apos; Addresses and Dates of Birth for Five Months</title><link>https://zerotolerance.me/cyberthreats/uk-companies-house-webfiling-broken-access-control/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/uk-companies-house-webfiling-broken-access-control/</guid><description>A broken access control flaw in the Companies House WebFiling service - introduced during the October 2025 GOV.UK One Login migration.</description><pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>Aura: The Identity Protection Company That Couldn&apos;t Protect Its Own Data - 903K Records Stolen by ShinyHunters</title><link>https://zerotolerance.me/cyberthreats/aura-identity-protection-shinyhunters-breach/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/aura-identity-protection-shinyhunters-breach/</guid><description>ShinyHunters vished an Aura employee, compromised their Okta SSO credentials, and exfiltrated 903,100 records from a legacy marketing platform inherited.</description><pubDate>Wed, 11 Mar 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>Google Disrupts UNC2814: Chinese Espionage Group Breached 53 Telecoms and Governments Across 42 Countries Using Google Sheets C2</title><link>https://zerotolerance.me/cyberthreats/unc2814-gridtide-china-espionage-google-sheets-c2/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/unc2814-gridtide-china-espionage-google-sheets-c2/</guid><description>Google disrupted UNC2814, a suspected PRC espionage group that breached 53 telecoms and governments across 42 countries using Google Sheets as C2.</description><pubDate>Wed, 25 Feb 2026 00:00:00 GMT</pubDate><category>nation-state</category></item><item><title>Intoxalock: Cyberattack Bricks 150,000 Court-Mandated DUI Devices Across 46 States for 8 Days</title><link>https://zerotolerance.me/cyberthreats/intoxalock-cyberattack-dui-interlock-devices-bricked/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/intoxalock-cyberattack-dui-interlock-devices-bricked/</guid><description>A cyberattack on Consumer Safety Technology disabled backend calibration systems for Intoxalock ignition interlock devices from March 14-22.</description><pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>Woflow: One SaaS Vendor Breach Exposes Walmart, DoorDash, Uber, and Deliveroo - 326GB Archive Published by ShinyHunters</title><link>https://zerotolerance.me/cyberthreats/woflow-shinyhunters-supply-chain-breach-walmart-doordash-uber-deliveroo/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/woflow-shinyhunters-supply-chain-breach-walmart-doordash-uber-deliveroo/</guid><description>ShinyHunters breached Woflow, an AI merchant data platform serving as the data infrastructure layer for four major delivery/retail platforms.</description><pubDate>Tue, 03 Mar 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>APT IRAN&apos;s 375TB Lockheed Martin Claim: Fabricated Data Dump, Real Information Operation</title><link>https://zerotolerance.me/cyberthreats/apt-iran-lockheed-martin-375tb-fabrication/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/apt-iran-lockheed-martin-375tb-fabrication/</guid><description>Self-named hacktivist collective claims 375TB exfiltration from Lockheed Martin. Zero verified samples after 10 days. Separately, MOIS-backed Handala.</description><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><category>nation-state</category></item><item><title>F5 BIG-IP: Critical RCE Exploited in the Wild After Five-Month Misclassification</title><link>https://zerotolerance.me/cyberthreats/f5-big-ip-cve-2025-53521-rce-exploitation/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/f5-big-ip-cve-2025-53521-rce-exploitation/</guid><description>F5 reclassifies BIG-IP APM vulnerability CVE-2025-53521 from denial-of-service to unauthenticated RCE. Memory-resident webshells deployed.</description><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><category>nation-state</category></item><item><title>VoidStealer v2.0: First Infostealer to Bypass Chrome ABE via Hardware Breakpoints - No Injection, No Escalation</title><link>https://zerotolerance.me/cyberthreats/voidstealer-chrome-abe-bypass-hardware-breakpoints/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/voidstealer-chrome-abe-bypass-hardware-breakpoints/</guid><description>VoidStealer is the first infostealer in the wild to bypass Chrome&apos;s Application-Bound Encryption without code injection or privilege escalation.</description><pubDate>Sun, 29 Mar 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>FBI Director Patel: Handala Publishes 300+ Emails from Personal Gmail - 11 Prior Breaches on HIBP</title><link>https://zerotolerance.me/cyberthreats/handala-fbi-director-patel-gmail-hack/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/handala-fbi-director-patel-gmail-hack/</guid><description>Iran&apos;s MOIS-backed Handala published 300+ emails and photos from FBI Director Kash Patel&apos;s personal Gmail. The account appeared in 11 prior data breaches.</description><pubDate>Sun, 29 Mar 2026 00:00:00 GMT</pubDate><category>nation-state</category></item><item><title>Telnyx SDK Backdoored on PyPI: TeamPCP Hides Credential Stealer in WAV Audio Files</title><link>https://zerotolerance.me/cyberthreats/teampcp-telnyx-pypi-wav-steganography/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/teampcp-telnyx-pypi-wav-steganography/</guid><description>TeamPCP backdoored the Telnyx Python SDK using credentials stolen during the LiteLLM compromise. Payloads hidden via WAV steganography. Quarantined in 6 hours.</description><pubDate>Sun, 29 Mar 2026 00:00:00 GMT</pubDate><category>supply-chain</category></item><item><title>European Commission: ShinyHunters Claim 350GB AWS Cloud Breach - Second Hack in Under Two Months</title><link>https://zerotolerance.me/cyberthreats/european-commission-aws-shinyhunters-breach/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/european-commission-aws-shinyhunters-breach/</guid><description>Attackers compromised the Commission&apos;s AWS account hosting Europa.eu. ShinyHunters claim 350GB stolen including mail servers, databases, and contracts.</description><pubDate>Sun, 29 Mar 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>Infiniti Stealer: First macOS Infostealer Combining ClickFix Delivery with Nuitka-Compiled Python Payload</title><link>https://zerotolerance.me/cyberthreats/infiniti-stealer-macos-clickfix-nuitka/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/infiniti-stealer-macos-clickfix-nuitka/</guid><description>A new macOS stealer uses fake Cloudflare CAPTCHAs to trick users into pasting a curl command into Terminal. Steals Keychain, browser credentials.</description><pubDate>Sat, 28 Mar 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>DarkSword: iOS Zero-Day Exploit Chain Targets Four Countries, Full Kit Leaked</title><link>https://zerotolerance.me/cyberthreats/darksword-ios-exploit-chain-saudi/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/darksword-ios-exploit-chain-saudi/</guid><description>A 6-vulnerability iOS exploit chain deploying three malware variants targeted users across Saudi Arabia, Turkey, Malaysia, and Ukraine.</description><pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate><category>nation-state</category></item><item><title>Infutor: 676 Million Records Including SSNs Exposed via Misconfigured Elasticsearch</title><link>https://zerotolerance.me/cyberthreats/infutor-676m-ssn-exposure/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/infutor-676m-ssn-exposure/</guid><description>Elasticsearch 8.15.2 with security explicitly disabled exposed 676M consumer records including full SSNs Mar 8, 2026 · 676M records.</description><pubDate>Sun, 08 Mar 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>TELUS Digital: ShinyHunters Steal 1 Petabyte via Stolen GCP Credentials</title><link>https://zerotolerance.me/cyberthreats/telus-digital-shinyhunters-1pb/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/telus-digital-shinyhunters-1pb/</guid><description>ShinyHunters exfiltrated ~1PB from the US$2.7B Canadian BPO giant - FBI background checks, voice recordings, source code, AI training data.</description><pubDate>Wed, 11 Mar 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>Interlock Ransomware Exploits Cisco FMC Zero-Day (CVE-2026-20131) - CVSS 10.0</title><link>https://zerotolerance.me/cyberthreats/interlock-cisco-fmc-cve-2026-20131/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/interlock-cisco-fmc-cve-2026-20131/</guid><description>Interlock ransomware exploited a Cisco FMC zero-day for 36 days before disclosure. Unauthenticated RCE as root. Also affects Cisco Security Cloud Control.</description><pubDate>Wed, 04 Mar 2026 00:00:00 GMT</pubDate><category>ransomware</category></item><item><title>AkzoNobel: Anubis Ransomware Steals 170GB - Passports, Client Agreements, Financial Records Leaked</title><link>https://zerotolerance.me/cyberthreats/akzonobel-anubis-ransomware/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/akzonobel-anubis-ransomware/</guid><description>Dutch paint giant AkzoNobel confirmed breach of US site. Anubis ransomware exfiltrated 170,000 files including passport scans, financial records.</description><pubDate>Sun, 01 Mar 2026 00:00:00 GMT</pubDate><category>ransomware</category></item><item><title>Salford City College: DragonForce Exfiltrates 256GB Including Mental Health Records</title><link>https://zerotolerance.me/cyberthreats/dragonforce-salford-city-college/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/dragonforce-salford-city-college/</guid><description>DragonForce ransomware cartel claims exfiltration of 256.92GB from one of Greater Manchester&apos;s largest FE colleges Mar 6, 2026.</description><pubDate>Fri, 06 Mar 2026 00:00:00 GMT</pubDate><category>ransomware</category></item><item><title>MuddyWater Pre-Positions Dindoor and Fakeset Backdoors on US Bank, Airport, Defense Networks</title><link>https://zerotolerance.me/cyberthreats/muddywater-dindoor-fakeset-us-infrastructure/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/muddywater-dindoor-fakeset-us-infrastructure/</guid><description>Iran&apos;s MuddyWater embedded Deno-based and Python backdoors on a US bank, airport, and defense company weeks before US-Israeli strikes on Iran.</description><pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate><category>nation-state</category></item><item><title>Navia Benefit Solutions: 2.7M Records Exposed via BOLA API Flaw</title><link>https://zerotolerance.me/cyberthreats/navia-benefit-solutions-bola-api-breach/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/navia-benefit-solutions-bola-api-breach/</guid><description>A BOLA flaw in Navia Benefit Solutions&apos; API exposed 2.7 million benefit plan participants including HackerOne employees. Seven years of records.</description><pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>NasirSecurity: Pro-Iranian Group Targets Gulf Energy Supply Chains</title><link>https://zerotolerance.me/cyberthreats/nasirsecurity-gulf-energy-supply-chain/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/nasirsecurity-gulf-energy-supply-chain/</guid><description>Pro-Iranian NasirSecurity claimed breaches of four Gulf energy firms. Resecurity traced the data to compromised supply chain vendors, not the majors.</description><pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate><category>supply-chain</category></item><item><title>LiteLLM Backdoored on PyPI: TeamPCP Supply Chain Attack Targets AI Framework With 480M Downloads</title><link>https://zerotolerance.me/cyberthreats/litellm-teampcp-pypi-supply-chain/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/litellm-teampcp-pypi-supply-chain/</guid><description>TeamPCP backdoored LiteLLM on PyPI using credentials stolen from the Trivy compromise. 480M total downloads. .pth persistence infects all Python processes.</description><pubDate>Tue, 24 Mar 2026 00:00:00 GMT</pubDate><category>supply-chain</category></item><item><title>Trivy Supply Chain Attack: Security Scanner Weaponized, 1,000+ Cloud Environments Infected</title><link>https://zerotolerance.me/cyberthreats/trivy-supply-chain-cve-2026-33634/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/trivy-supply-chain-cve-2026-33634/</guid><description>TeamPCP weaponized Aqua Security&apos;s Trivy scanner (CVE-2026-33634, CVSS 9.9), infecting 1,000+ cloud environments across five package ecosystems.</description><pubDate>Thu, 19 Mar 2026 00:00:00 GMT</pubDate><category>supply-chain</category></item><item><title>149 Hacktivist DDoS Attacks Hit 110 Organizations Across 16 Countries</title><link>https://zerotolerance.me/cyberthreats/gcc-hacktivist-ddos-campaign-2026/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/gcc-hacktivist-ddos-campaign-2026/</guid><description>Coordinated hacktivist DDoS campaign triggered by US-Israeli strikes on Iran. 12 pro-Iranian and allied groups conducted 149 attacks against banks, airports.</description><pubDate>Sat, 28 Feb 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>Cisco SD-WAN Zero-Day (CVE-2026-20127) Exploited Since 2023 by Sophisticated APT</title><link>https://zerotolerance.me/cyberthreats/cisco-sdwan-cve-2026-20127-uat8616/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/cisco-sdwan-cve-2026-20127-uat8616/</guid><description>Critical auth bypass in Cisco Catalyst SD-WAN exploited by APT UAT-8616 since 2023. CVSS 10.0. Five Eyes joint advisory. CISA emergency directive ED 26-03.</description><pubDate>Wed, 25 Feb 2026 00:00:00 GMT</pubDate><category>nation-state</category></item><item><title>LexisNexis: 400K Users Exposed Including Federal Judges - Hardcoded Password</title><link>https://zerotolerance.me/cyberthreats/lexisnexis-hardcoded-password-breach/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/lexisnexis-hardcoded-password-breach/</guid><description>Threat actor FULCRUMSEC exploited CVE-2025-55182 to breach LexisNexis AWS infrastructure. 400K user profiles, 118 .gov accounts including 3 federal judges.</description><pubDate>Tue, 24 Feb 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>University of Mississippi Medical Center: 35 Clinics Shut Down 9 Days by Ransomware</title><link>https://zerotolerance.me/cyberthreats/ummc-ransomware-35-clinics/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/ummc-ransomware-35-clinics/</guid><description>Ransomware attack shut down all 35 statewide clinics for 9 days. Mississippi&apos;s only Level 1 trauma center. Recovery expected to take weeks to months.</description><pubDate>Thu, 19 Feb 2026 00:00:00 GMT</pubDate><category>ransomware</category></item><item><title>UAE Foils AI-Powered Ransomware Campaign - 200,000 Attacks/Day Intercepted</title><link>https://zerotolerance.me/cyberthreats/uae-ai-ransomware-campaign-2026/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/uae-ai-ransomware-campaign-2026/</guid><description>UAE Cybersecurity Council announced disruption of coordinated attacks involving AI-powered ransomware targeting national platforms.</description><pubDate>Sat, 21 Feb 2026 00:00:00 GMT</pubDate><category>ransomware</category></item><item><title>French National Bank Registry (FICOBA): 1.2 Million Accounts Exposed</title><link>https://zerotolerance.me/cyberthreats/ficoba-french-bank-registry-breach/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/ficoba-french-bank-registry-breach/</guid><description>Attacker used stolen civil servant credentials to access France&apos;s centralized registry of all bank accounts. 1.2M accounts including IBANs and tax IDs exposed.</description><pubDate>Wed, 18 Feb 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>Chrome Zero-Day CVE-2026-2441 Exploited in the Wild - Use-After-Free in CSS Engine</title><link>https://zerotolerance.me/cyberthreats/chrome-zero-day-cve-2026-2441/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/chrome-zero-day-cve-2026-2441/</guid><description>Google patched a high-severity Chrome zero-day after confirming active exploitation. CSSFontFeatureValuesMap use-after-free affecting all Chromium browsers.</description><pubDate>Sun, 01 Feb 2026 00:00:00 GMT</pubDate><category>supply-chain</category></item><item><title>Odido: 6.2 Million Dutch Customers Breached by ShinyHunters</title><link>https://zerotolerance.me/cyberthreats/odido-shinyhunters-breach/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/odido-shinyhunters-breach/</guid><description>ShinyHunters social-engineered Odido&apos;s Salesforce CRM via phishing + vishing, scraping 6.5M individuals + 600K companies over 48 hours.</description><pubDate>Sun, 01 Feb 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>Abu Dhabi Finance Week: 700+ VIP Passports Exposed via Cloud Misconfiguration</title><link>https://zerotolerance.me/cyberthreats/abu-dhabi-finance-week-passport-leak/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/abu-dhabi-finance-week-passport-leak/</guid><description>Passport scans of 700+ VIP attendees including former UK PM David Cameron, Binance CEO, hedge fund billionaires Feb 1, 2026.</description><pubDate>Sun, 01 Feb 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>ACWA Power: INC Ransom Exfiltrates 400GB from PIF-Backed Energy Giant</title><link>https://zerotolerance.me/cyberthreats/acwa-power-inc-ransom-breach/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/acwa-power-inc-ransom-breach/</guid><description>INC Ransom exfiltrated 400GB from Saudi Arabia&apos;s largest private energy company - engineering drawings, financial records.</description><pubDate>Sun, 01 Feb 2026 00:00:00 GMT</pubDate><category>ransomware</category></item><item><title>Bahrain National Security Agency: Claimed 200GB Email Server Exfiltration</title><link>https://zerotolerance.me/cyberthreats/bahrain-nsa-email-exfiltration/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/bahrain-nsa-email-exfiltration/</guid><description>Three threat actors claimed 200GB from Bahrain&apos;s NSA email infrastructure in 8 months. ESIX 7.13. US Fifth Fleet and UK intelligence-sharing implications.</description><pubDate>Sun, 01 Feb 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item><item><title>European Commission MDM Breach - Staff Data Exposed via Ivanti Vulnerability</title><link>https://zerotolerance.me/cyberthreats/european-commission-mdm-breach/</link><guid isPermaLink="true">https://zerotolerance.me/cyberthreats/european-commission-mdm-breach/</guid><description>CERT-EU detected attack on the European Commission&apos;s MDM infrastructure. Staff names, phone numbers, emails exposed. Contained within 9 hours.</description><pubDate>Fri, 30 Jan 2026 00:00:00 GMT</pubDate><category>data-breaches</category></item></channel></rss>