๐ hackmanac.com
๐ hackrisk.io
As we step into 2026, cyber risk analysis needs more than isolated data points โ it requires context and comparison.
Today, HackRisk introduces ๐๐ซ๐๐ง๐ ๐๐จ๐ฆ๐ฉ๐๐ซ๐ข๐ฌ๐จ๐ง, a ๐ง๐๐ฐ ๐ฉ๐ซ๐๐ฆ๐ข๐ฎ๐ฆ ๐๐๐ฉ๐๐๐ข๐ฅ๐ข๐ญ๐ฒ designed for professionals who rely on data to make strategic decisions.
1/3
Sector: Telco
Threat class: Cybercrime
Status: Confirmed
Source: www.rtl.nl/nieuws/binne...
Sector: Telco
Threat class: Cybercrime
Status: Confirmed
Source: www.rtl.nl/nieuws/binne...
๐ณ๐ฑNetherlands - Odido
Odido suffered a cyberattack exposing personal data from 6.2 million customer accounts, including names, contact details, IBANs, and ID information.
๐ณ๐ฑNetherlands - Odido
Odido suffered a cyberattack exposing personal data from 6.2 million customer accounts, including names, contact details, IBANs, and ID information.
๐ Explore the full LockBit 5.0 threat profile on HackRisk
hackrisk.io
5/5
๐ Explore the full LockBit 5.0 threat profile on HackRisk
hackrisk.io
5/5
โข United States
โข Brazil
โข Italy
โข Turkey
โข Spain
โข India
โข Mexico
โข France
โข Austria
โข Germany
4/5
โข United States
โข Brazil
โข Italy
โข Turkey
โข Spain
โข India
โข Mexico
โข France
โข Austria
โข Germany
4/5
โข Average ESIXยฉ: ๐.๐ (๐๐ข๐ ๐ก severity range)
โข ๐๐ ๐๐ซ๐ข๐ญ๐ข๐๐๐ฅ attacks
โข Consistent cross-sector targeting
โข Sustained activity pattern
3/5
โข Average ESIXยฉ: ๐.๐ (๐๐ข๐ ๐ก severity range)
โข ๐๐ ๐๐ซ๐ข๐ญ๐ข๐๐๐ฅ attacks
โข Consistent cross-sector targeting
โข Sustained activity pattern
3/5
๐ ๐๐จ๐ฉ ๐ญ๐๐ซ๐ ๐๐ญ๐๐ ๐ฌ๐๐๐ญ๐จ๐ซ๐ฌ
โข Manufacturing
โข Professional / Scientific / Technical
โข Healthcare
โข Wholesale / Retail
โข Education
โข Financial / Insurance
โข Construction
โข Hospitality
โข Gov / Mil / LE
โข ICT
2/5
๐ ๐๐จ๐ฉ ๐ญ๐๐ซ๐ ๐๐ญ๐๐ ๐ฌ๐๐๐ญ๐จ๐ซ๐ฌ
โข Manufacturing
โข Professional / Scientific / Technical
โข Healthcare
โข Wholesale / Retail
โข Education
โข Financial / Insurance
โข Construction
โข Hospitality
โข Gov / Mil / LE
โข ICT
2/5
Since November 24, LockBit has resurfaced in its fifth reincarnation โ ๐๐จ๐๐ค๐๐ข๐ญ ๐.๐ โ and has already been linked to 99 attacks.
For a CISO, the key question is:
โ๐๐จ ๐๐ค๐๐ ๐ฝ๐๐ฉ ๐ง๐๐ก๐๐ซ๐๐ฃ๐ฉ ๐ฉ๐ค ๐ข๐ฎ ๐ค๐ง๐๐๐ฃ๐๐ฏ๐๐ฉ๐๐ค๐ฃ?โ
1/5
Since November 24, LockBit has resurfaced in its fifth reincarnation โ ๐๐จ๐๐ค๐๐ข๐ญ ๐.๐ โ and has already been linked to 99 attacks.
For a CISO, the key question is:
โ๐๐จ ๐๐ค๐๐ ๐ฝ๐๐ฉ ๐ง๐๐ก๐๐ซ๐๐ฃ๐ฉ ๐ฉ๐ค ๐ข๐ฎ ๐ค๐ง๐๐๐ฃ๐๐ฏ๐๐ฉ๐๐ค๐ฃ?โ
1/5
For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
About this post:
Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources.
About this post:
Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources.
Threat class: Cybercrime
Observed: Feb 11, 2026
Status: Pending verification
Threat class: Cybercrime
Observed: Feb 11, 2026
Status: Pending verification
๐บ๐ธUS - Tsunami Tsolutions
Everest hacking group claims to have breached Tsunami Tsolutions.
๐บ๐ธUS - Tsunami Tsolutions
Everest hacking group claims to have breached Tsunami Tsolutions.
For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
About this post:
Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources.
About this post:
Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources.
๐บ๐ธUS - BCS ProSoft
Sinobi hacking group claims to have breached BCS ProSoft.
Allegedly, the attackers exfiltrated 100 GB of data, including financial data, customerโs data and contracts.
Sector: ICT
Threat class: Cybercrime
Observed: Feb 11, 2026
Status: Pending verification
๐บ๐ธUS - BCS ProSoft
Sinobi hacking group claims to have breached BCS ProSoft.
Allegedly, the attackers exfiltrated 100 GB of data, including financial data, customerโs data and contracts.
Sector: ICT
Threat class: Cybercrime
Observed: Feb 11, 2026
Status: Pending verification
Hack Tuesday: Week 04 - 10 February 2026
โ ๏ธ334 cyber attacks across 54 countries โ ๏ธ
More details:
hackmanac.com/news/hack-tu...
Hack Tuesday: Week 04 - 10 February 2026
โ ๏ธ334 cyber attacks across 54 countries โ ๏ธ
More details:
hackmanac.com/news/hack-tu...
For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
About this post:
Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources.
About this post:
Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources.
Threat class: Cybercrime
Observed: Feb 10, 2026
Status: Pending verification
Threat class: Cybercrime
Observed: Feb 10, 2026
Status: Pending verification
๐ธ๐ฆSaudi Arabia - Texcomp
Space Bears hacking group claims to have breached Texcomp.
Allegedly, the attackers exfiltrated an SQL database containing clientsโ and partnersโ information such as names, email addresses, physical addresses, and phone numbers.
๐ธ๐ฆSaudi Arabia - Texcomp
Space Bears hacking group claims to have breached Texcomp.
Allegedly, the attackers exfiltrated an SQL database containing clientsโ and partnersโ information such as names, email addresses, physical addresses, and phone numbers.
For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
About this post:
Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources.
About this post:
Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources.
md5: f0bdb2add62b0196a50e25e45e370cc5
Ransom note "___RestoreYourFiles___.txt" attached.
Victim sector: Professional
Threat class: Cybercrime
Observed: Feb 10, 2026
Status: Pending verification
md5: f0bdb2add62b0196a50e25e45e370cc5
Ransom note "___RestoreYourFiles___.txt" attached.
Victim sector: Professional
Threat class: Cybercrime
Observed: Feb 10, 2026
Status: Pending verification
A ransomware group calling itself Reynolds has been spotted. At the moment, only one victim is listed on the cybercriminalsโ blog, apparently linked to an attack that occurred on November 13, 2025.
A ransomware group calling itself Reynolds has been spotted. At the moment, only one victim is listed on the cybercriminalsโ blog, apparently linked to an attack that occurred on November 13, 2025.
For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.