Visualização normal

Ontem — 8 de Maio de 2026Stream principal
  • ✇HACKMAGEDDON
  • 16-30 April 2026 Cyber Attacks Timeline Paolo Passeri
    In the second timeline of April 2026 I collected 108 events, corresponding to an average of 7.2 events per day, a number that confirms a growing trend, driven by the increasing number of supply chain attacks, compared to the previous timeline, where I collected 94 events (6.27 events/day).
     

16-30 April 2026 Cyber Attacks Timeline

8 de Maio de 2026, 07:04
In the second timeline of April 2026 I collected 108 events, corresponding to an average of 7.2 events per day, a number that confirms a growing trend, driven by the increasing number of supply chain attacks, compared to the previous timeline, where I collected 94 events (6.27 events/day).
Antes de ontemStream principal
  • ✇HACKMAGEDDON
  • 1-15 April 2026 Cyber Attacks Timeline Paolo Passeri
    The first timeline of April 2026 brings an evolution in terms of methodology: from now on I will map the initial access techniques with the MITRE ATT&CK model. I also decided to merge the categories of Finance and Fintech in the sectors chart. From an event perspective, the first half of April 2026 confirmed a sustained trend...
     

1-15 April 2026 Cyber Attacks Timeline

24 de Abril de 2026, 05:39
The first timeline of April 2026 brings an evolution in terms of methodology: from now on I will map the initial access techniques with the MITRE ATT&CK model. I also decided to merge the categories of Finance and Fintech in the sectors chart. From an event perspective, the first half of April 2026 confirmed a sustained trend...
  • ✇HACKMAGEDDON
  • 16-31 March 2026 Cyber Attacks Timeline Paolo Passeri
    The second half of March 2026 has been very active from an infosec standpoint, with 124 events and a threat landscape dominated by malware. As always, cyber crime led the motivations chart with 65%, slightly up from the previous timeline.
     

16-31 March 2026 Cyber Attacks Timeline

14 de Abril de 2026, 08:57
The second half of March 2026 has been very active from an infosec standpoint, with 124 events and a threat landscape dominated by malware. As always, cyber crime led the motivations chart with 65%, slightly up from the previous timeline.
  • ✇Firewall Daily – The Cyber Express
  • Eurail Confirms Security Breach Affecting Over 300,000 U.S. Individuals Samiksha Jain
    The Eurail data breach has exposed personal information of approximately 308,777 individuals in the United States, according to a disclosure by Eurail B.V., the Netherlands-based company that manages the official online sales platform for Eurail and Interrail rail passes. Among those affected are 242 residents of New Hampshire. The Eurail data breach occurred between late December 2025 and early January 2026, when an unauthorized actor gained access to Eurail’s network and transferred files.
     

Eurail Confirms Security Breach Affecting Over 300,000 U.S. Individuals

Eurail data breach

The Eurail data breach has exposed personal information of approximately 308,777 individuals in the United States, according to a disclosure by Eurail B.V., the Netherlands-based company that manages the official online sales platform for Eurail and Interrail rail passes. Among those affected are 242 residents of New Hampshire. The Eurail data breach occurred between late December 2025 and early January 2026, when an unauthorized actor gained access to Eurail’s network and transferred files. The company identified the issue after detecting unusual activity within its systems and later confirmed the exposure of personal data.

Eurail Data Breach Timeline and Response

Following the detection of suspicious activity, Eurail activated its incident response procedures and initiated an investigation with third-party cybersecurity experts. Law enforcement was also notified and is continuing to investigate the incident. According to the company, the unauthorized access took place on December 26, 2025, when files were transferred from its network. The investigation concluded that these files contained personal information, with the final determination made on February 25, 2026. Eurail began notifying affected individuals and state authorities on March 27, 2026, reporting the breach to attorneys general in California, New Hampshire, Oregon, and Vermont. A public notice was also issued on the European Youth Portal.

Information Compromised in the Eurail Data Breach

The company confirmed that the Eurail data breach involved sensitive personal information, including:
  • Names
  • Passport numbers
While this represents the confirmed data for U.S. individuals, earlier findings suggest that the broader impact may be more extensive. Previous disclosures linked to the incident indicated that additional data types were compromised, including financial and health-related information.

Broader Exposure Linked to Eurail Data Breach

Earlier this year, Eurail confirmed that data from a prior breach was being offered for sale on the dark web, with samples appearing on Telegram. This development suggested that the incident extended beyond initial containment and had evolved into a wider data exposure situation. The earlier dataset reportedly included passport details, bank account IBANs, email addresses, phone numbers, and health information, in addition to names. The combination of such data increases the risk of identity theft, financial fraud, and long-term misuse. The breach is also believed to have affected customers who purchased Eurail or Interrail passes through partner channels, as well as participants in the DiscoverEU program, which issued its own warning that sensitive personal details, including passport copies and financial information, may have been exposed.

Company Measures and Security Actions

In response to the Eurail data breach, the company has taken several steps, including terminating unauthorized access, strengthening internal security measures, and continuing its cooperation with law enforcement and cybersecurity experts. Eurail stated that it takes the protection of customer information seriously and is working to prevent similar incidents in the future. The investigation into the full scope of the breach is ongoing.

What Affected Individuals Should Do

Eurail has advised customers to stay alert to suspicious communications, especially any requests for personal information. Individuals are encouraged not to share sensitive data with unknown or unsolicited contacts claiming to represent the company. The company also recommends that users monitor their financial accounts and review credit reports regularly for any unauthorized activity. In the United States, consumers can obtain a free annual credit report from each of the three major credit bureaus. Those who suspect misuse of their information are advised to contact the Federal Trade Commission, reach out to their state’s attorney general office, and report the matter to local law enforcement.

A Growing Risk Around Travel Data

The Eurail data breach highlights the risks associated with large-scale travel platforms that handle sensitive identity and financial information. With passport numbers and other personal identifiers involved, the exposure can lead to long-term consequences for affected individuals. As investigations continue, the incident reinforces the need for stronger data protection measures and constant monitoring across systems that manage sensitive traveler information.

1-15 March 2026 Cyber Attacks Timeline

26 de Março de 2026, 07:56
In the first half of March 2026 I collected 95 events (6.34 events/day) with a threat landscape dominated by malware once ahead of account takeovers and ransomware.

16-28 February 2026 Cyber Attacks Timeline

6 de Março de 2026, 06:19
In the second half of February 2026 I collected 80 events with a threat landscape dominated by malware with 42%, ahead of account takeovers and ransomware.
  • ✇HACKMAGEDDON
  • 1-15 February 2026 Cyber Attacks Timeline Paolo Passeri
    In the first half of February 2026 I collected 96 events (6.4 events/day) with a threat landscape dominated by malware with 33%, (it was 38% in the second half of last month, once again ahead of ransomware (up to 20% from 14%), and account takeovers, down to 8% from 14%.
     

1-15 February 2026 Cyber Attacks Timeline

18 de Fevereiro de 2026, 08:52
In the first half of February 2026 I collected 96 events (6.4 events/day) with a threat landscape dominated by malware with 33%, (it was 38% in the second half of last month, once again ahead of ransomware (up to 20% from 14%), and account takeovers, down to 8% from 14%.

Malicious Campaigns Using AI-generated Malware in 2026

12 de Fevereiro de 2026, 08:00
In this blog post I am collecting the campaigns that show evidence of being AI-generated, or make use of AI tools to increase their impact. As always I will continue to update the list as soon as new campaigns emerge.

16-31 January 2026 Cyber Attacks Timeline

3 de Fevereiro de 2026, 08:27
After the first timeline of January 2026, it’s time to publish the list of the main cyber attacks occurred in the second half of the month, between 16 and 31 January 2026.
  • ✇HACKMAGEDDON
  • 1-15 January 2026 Cyber Attacks Timeline Paolo Passeri
    And I am back with the 1-15 January 2026 cyber attacks timeline. In the first timeline of January 2026, I collected 61 events (4.07 events/day) with a threat landscape dominated by malware with 36%, a direct comparison with the previous timelines is not fair, since I changed the criteria for the timeline, and the previous one dates back to more than one year ago, ahead of account takeover with 15% and ransomware, with 11%.
     

1-15 January 2026 Cyber Attacks Timeline

19 de Janeiro de 2026, 11:10
And I am back with the 1-15 January 2026 cyber attacks timeline. In the first timeline of January 2026, I collected 61 events (4.07 events/day) with a threat landscape dominated by malware with 36%, a direct comparison with the previous timelines is not fair, since I changed the criteria for the timeline, and the previous one dates back to more than one year ago, ahead of account takeover with 15% and ransomware, with 11%.
  • ✇HACKMAGEDDON
  • CVEs Targeting Remote Access Technologies in 2025 Paolo Passeri
    The exploitation of vulnerabilities targeting remote access technologies to gain initial access is continuing relentlessly also during 2025, with initial access brokers, and in general opportunistic and targeted threat actors, quite active in leveraging software flaws to break into organizations.
     

CVEs Targeting Remote Access Technologies in 2025

7 de Outubro de 2025, 05:18
The exploitation of vulnerabilities targeting remote access technologies to gain initial access is continuing relentlessly also during 2025, with initial access brokers, and in general opportunistic and targeted threat actors, quite active in leveraging software flaws to break into organizations.

1-15 March 2025 Cyber Attacks Timeline

5 de Setembro de 2025, 06:44
In the first timeline of March 2025, I collected 127 events with a threat landscape dominated by malware and ransomware...

1-15 February 2025 Cyber Attacks Timeline

23 de Julho de 2025, 07:53
In the first timeline of February 2025, I collected 115 events (7.67 events/day) with a threat landscape dominated by malware with 30%, the same value of the previous timeline.

January 2025 Cyber Attacks Statistics

13 de Junho de 2025, 07:40
After the cyber attacks timelines, it’s time to publish the statistics for January 2025 where I collected and analyzed 216 events.In January 2025, Cyber Crime continued to lead the Motivations chart.
  • ✇HACKMAGEDDON
  • 16-31 January Cyber Attacks Timeline Paolo Passeri
    In the second timeline of January 2025, I collected 107 events with a threat landscape dominated by malware with 30%, up from 18% of the previous timeline, and very close to the values of December 2024, ahead of ransomware with 19%.
     

16-31 January Cyber Attacks Timeline

4 de Junho de 2025, 12:45
In the second timeline of January 2025, I collected 107 events with a threat landscape dominated by malware with 30%, up from 18% of the previous timeline, and very close to the values of December 2024, ahead of ransomware with 19%.
  • ✇HACKMAGEDDON
  • 1-15 January 2025 Cyber Attacks Timeline Paolo Passeri
    In the first timeline of January 2025, I collected 109 events with a threat landscape dominated by malware with 18%, down from 33% of the previous timeline, and once again ahead of account takeovers with 17% (it was 20% in the previous timeline), and ransomware with 14%.
     

1-15 January 2025 Cyber Attacks Timeline

6 de Maio de 2025, 01:26
In the first timeline of January 2025, I collected 109 events with a threat landscape dominated by malware with 18%, down from 33% of the previous timeline, and once again ahead of account takeovers with 17% (it was 20% in the previous timeline), and ransomware with 14%.

16-31 December 2024 Cyber Attacks Timeline

18 de Abril de 2025, 07:51
In the second timeline of December 2024, I collected 94 events with a threat landscape dominated by malware with...

1-15 December 2024 Cyber Attacks Timeline

4 de Abril de 2025, 07:09
In the first timeline of December 2024, I collected 115 events (7.67 events/day) with a threat landscape dominated...

16-30 November 2024 Cyber Attacks Timeline

27 de Fevereiro de 2025, 08:14
In the second timeline of November 2024 I collected 117 events (7.8 events/day) with a threat landscape dominated by malware

1-15 November 2024 Cyber Attacks Timeline

6 de Fevereiro de 2025, 05:34
In the first timeline of November 2024 I collected 128 events with a threat landscape dominated by malware...
❌
❌