Hackmanac
banner
hackmanac.com
Hackmanac
@hackmanac.com
We track verified, real-world cyber attacks to help you develop effective Cybersecurity strategies. Try HackRisk.io, your Strategic Threat Intelligence platform.

๐ŸŒ hackmanac.com
๐ŸŒ hackrisk.io
Pinned
Hackmanac @hackmanac.com ยท Jan 5
๐ˆ๐๐“๐„๐‹๐‹๐ˆ๐†๐„๐๐‚๐„ ๐๐„๐„๐ƒ๐’ ๐‚๐Ž๐Œ๐๐€๐‘๐ˆ๐’๐Ž๐ โš–๏ธ

As we step into 2026, cyber risk analysis needs more than isolated data points โ€” it requires context and comparison.

Today, HackRisk introduces ๐“๐ซ๐ž๐ง๐ ๐‚๐จ๐ฆ๐ฉ๐š๐ซ๐ข๐ฌ๐จ๐ง, a ๐ง๐ž๐ฐ ๐ฉ๐ซ๐ž๐ฆ๐ข๐ฎ๐ฆ ๐œ๐š๐ฉ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ designed for professionals who rely on data to make strategic decisions.

1/3
The breach affected subsidiary Ben, was discovered days later, and is considered one of the largest data breaches in the Netherlands.

Sector: Telco
Threat class: Cybercrime
Status: Confirmed

Source: www.rtl.nl/nieuws/binne...
February 13, 2026 at 10:49 AM
๐ŸšจCyber Alert โ€ผ๏ธ

๐Ÿ‡ณ๐Ÿ‡ฑNetherlands - Odido

Odido suffered a cyberattack exposing personal data from 6.2 million customer accounts, including names, contact details, IBANs, and ID information.
February 13, 2026 at 10:49 AM
If your sector or country appears in these lists, this is no longer background noise.

๐Ÿ‘‰ Explore the full LockBit 5.0 threat profile on HackRisk
hackrisk.io

5/5
February 12, 2026 at 1:07 PM
๐ŸŒ ๐Œ๐จ๐ฌ๐ญ ๐ญ๐š๐ซ๐ ๐ž๐ญ๐ž๐ ๐œ๐จ๐ฎ๐ง๐ญ๐ซ๐ข๐ž๐ฌ
โ€ข United States
โ€ข Brazil
โ€ข Italy
โ€ข Turkey
โ€ข Spain
โ€ข India
โ€ข Mexico
โ€ข France
โ€ข Austria
โ€ข Germany

4/5
February 12, 2026 at 1:07 PM
๐Ÿ“ˆ ๐ˆ๐ฆ๐ฉ๐š๐œ๐ญ ๐ข๐ง๐๐ข๐œ๐š๐ญ๐จ๐ซ๐ฌ
โ€ข Average ESIXยฉ: ๐Ÿ“.๐Ÿ‘ (๐‡๐ข๐ ๐ก severity range)
โ€ข ๐Ÿ๐Ÿ“ ๐‚๐ซ๐ข๐ญ๐ข๐œ๐š๐ฅ attacks
โ€ข Consistent cross-sector targeting
โ€ข Sustained activity pattern

3/5
February 12, 2026 at 1:07 PM
On HackRisk, the Threat Actor profile allows you to assess this in minutes.

๐Ÿ“Š ๐“๐จ๐ฉ ๐ญ๐š๐ซ๐ ๐ž๐ญ๐ž๐ ๐ฌ๐ž๐œ๐ญ๐จ๐ซ๐ฌ
โ€ข Manufacturing
โ€ข Professional / Scientific / Technical
โ€ข Healthcare
โ€ข Wholesale / Retail
โ€ข Education
โ€ข Financial / Insurance
โ€ข Construction
โ€ข Hospitality
โ€ข Gov / Mil / LE
โ€ข ICT

2/5
February 12, 2026 at 1:07 PM
๐ŸŽฏ ๐”๐ฌ๐ž ๐‚๐š๐ฌ๐ž โ€” ๐ˆ๐ฌ ๐‹๐จ๐œ๐ค๐๐ข๐ญ ๐Ÿ“.๐ŸŽ ๐š ๐ซ๐ž๐š๐ฅ ๐ซ๐ข๐ฌ๐ค ๐Ÿ๐จ๐ซ ๐ฒ๐จ๐ฎ๐ซ ๐จ๐ซ๐ ๐š๐ง๐ข๐ณ๐š๐ญ๐ข๐จ๐ง?

Since November 24, LockBit has resurfaced in its fifth reincarnation โ€” ๐‹๐จ๐œ๐ค๐๐ข๐ญ ๐Ÿ“.๐ŸŽ โ€” and has already been linked to 99 attacks.

For a CISO, the key question is:
โ€œ๐™„๐™จ ๐™‡๐™ค๐™˜๐™ ๐˜ฝ๐™ž๐™ฉ ๐™ง๐™š๐™ก๐™š๐™ซ๐™–๐™ฃ๐™ฉ ๐™ฉ๐™ค ๐™ข๐™ฎ ๐™ค๐™ง๐™œ๐™–๐™ฃ๐™ž๐™ฏ๐™–๐™ฉ๐™ž๐™ค๐™ฃ?โ€

1/5
February 12, 2026 at 1:07 PM
No confidential or proprietary data was downloaded, copied, or redistributed, and sensitive details were redacted from the attached screenshot(s).

For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
February 12, 2026 at 3:58 AM
โ€”
About this post:
Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources.
February 12, 2026 at 3:58 AM
Sector: Professional / Scientific / Technical
Threat class: Cybercrime
Observed: Feb 11, 2026
Status: Pending verification
February 12, 2026 at 3:58 AM
Allegedly, the attackers exfiltrated 562 GB of data, including a database containing proprietary aviation data, aircraft component documentation, maintenance records, software source code, and export-controlled technical files.
February 12, 2026 at 3:58 AM
๐ŸšจCyberattack Alert โ€ผ๏ธ

๐Ÿ‡บ๐Ÿ‡ธUS - Tsunami Tsolutions

Everest hacking group claims to have breached Tsunami Tsolutions.
February 12, 2026 at 3:58 AM
No confidential or proprietary data was downloaded, copied, or redistributed, and sensitive details were redacted from the attached screenshot(s).

For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
February 11, 2026 at 2:22 AM
โ€”
About this post:
Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources.
February 11, 2026 at 2:22 AM
๐ŸšจCyberattack Alert โ€ผ๏ธ

๐Ÿ‡บ๐Ÿ‡ธUS - BCS ProSoft

Sinobi hacking group claims to have breached BCS ProSoft.

Allegedly, the attackers exfiltrated 100 GB of data, including financial data, customerโ€™s data and contracts.

Sector: ICT
Threat class: Cybercrime
Observed: Feb 11, 2026
Status: Pending verification
February 11, 2026 at 2:22 AM
๐ŸŸง #HackTuesday ๐ŸŸง

Hack Tuesday: Week 04 - 10 February 2026

โš ๏ธ334 cyber attacks across 54 countries โš ๏ธ

More details:
hackmanac.com/news/hack-tu...
Hackmanac HACK TUESDAY WEEK 04 - 10 FEBRUARY 2026
HACK TUESDAY WEEK 04 - 10 FEBRUARY 2026: 334 CYBERATTACKS ACROSS 54 COUNTRIES
hackmanac.com
February 10, 2026 at 1:05 PM
No confidential or proprietary data was downloaded, copied, or redistributed, and sensitive details were redacted from the attached screenshot(s).

For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
February 10, 2026 at 11:20 AM
โ€”
About this post:
Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources.
February 10, 2026 at 11:20 AM
Sector: ICT
Threat class: Cybercrime
Observed: Feb 10, 2026
Status: Pending verification
February 10, 2026 at 11:20 AM
๐ŸšจCyberattack Alert โ€ผ๏ธ

๐Ÿ‡ธ๐Ÿ‡ฆSaudi Arabia - Texcomp

Space Bears hacking group claims to have breached Texcomp.

Allegedly, the attackers exfiltrated an SQL database containing clientsโ€™ and partnersโ€™ information such as names, email addresses, physical addresses, and phone numbers.
February 10, 2026 at 11:20 AM
No confidential or proprietary data was downloaded, copied, or redistributed, and sensitive details were redacted from the attached screenshot(s).

For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
February 10, 2026 at 10:23 AM
โ€”
About this post:
Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources.
February 10, 2026 at 10:23 AM
The ransomware deployed by the threat actors appends a โ€œ.lockedโ€ file extension to encrypted files.

md5: f0bdb2add62b0196a50e25e45e370cc5
Ransom note "___RestoreYourFiles___.txt" attached.

Victim sector: Professional
Threat class: Cybercrime
Observed: Feb 10, 2026
Status: Pending verification
February 10, 2026 at 10:23 AM
โ€ผ๏ธNew ransomware group spotted: Reynolds

A ransomware group calling itself Reynolds has been spotted. At the moment, only one victim is listed on the cybercriminalsโ€™ blog, apparently linked to an attack that occurred on November 13, 2025.
February 10, 2026 at 10:23 AM
No confidential or proprietary data was downloaded, copied, or redistributed, and sensitive details were redacted from the attached screenshot(s).

For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
February 10, 2026 at 7:45 AM