Ransomware Attack Update - January 12th, 2026
😬 image
❗️Watched domains for Whiteintel alerts on the website and on the @DarkWebIntelBot have been updated. This list is monitoring United States Government domains. The list below was taken from: https://flatgithub.com/cisagov/dotgov-data/blob/main/?filename=current-full.csv&sha=08fdf001ad5460bad669b62e254e3b98918fd07b Watched: whitehouse.gov, visitthecapitol.gov, visitthecapital.gov, ushouse.gov, uscapitol.gov, uscapital.gov, speaker.gov, senate.gov, sen.gov, republicans.gov, house.gov, gop.gov, dems.gov, democrats.gov, copyright.gov, congress.gov, capital.gov, aoc.gov, ustaxcourt.gov, ussc.gov, usprobation.gov, uscourts.gov, uscavc.gov, usc.gov, usbankruptcy.gov, supremecourtus.gov, supremecourt.gov, supreme-court.gov, scuspd.gov, scus.gov, scinet.gov, scinet-test.gov, sc-us.gov, pacer.gov, judicialconference.gov, fjc.gov, federalrules.gov, federalprobation.gov, federalcourts.gov, fd.gov, cavc.gov, bankruptcy.gov, smithsonian.gov, ns.gov, nic.gov, itis.gov, igorville.gov, dotgov.gov, domainops.gov, dns.gov
❗️CISA has added 1 vulnerability to the KEV Catalog: CVE-2025-8110: Gogs Path Traversal Vulnerability
❗️🇵🇱 Polish Logistics Giant InPost Allegedly Breached with 2 Million Employee Records Exposed
🔧leaker: A leak discovery tool that returns valid credential leaks for emails, using passive online sources. GitHub: Nice password examples 😂 image
‼️Trend Micro Apex Central Multiple Vulnerabilities CVE: CVE-2025-69258 (CVSS: 9.8) CVE-2025-69259 (CVSS: 7.5) CVE-2025-69260 (CVSS: 7.5) CWE: CWE-1285, CWE-306, CWE-641 PoC/Writeup: Disclosure Date: January 7. 2026 Disclosure: image
❗️🇹🇭 Thai Electrical Transformer Manufacturer Charoenchai Hit by TENGU Ransomware with 60GB Data Stolen
❗️🇫🇷 Threat Actor Allegedly Selling Unauthorized Access to COMIN VTC Administration Panel in France
❗️🇺🇸 Target Takes Dev Server Offline After Hackers Claim to Steal Internal Source Code Hackers are claiming to have stolen internal source code from Target Corporation, posting samples of what appear to be private repositories on a public Gitea platform and advertising a larger dataset for sale, with listings suggesting roughly 860 GB of data across tens of thousands of files from the retailer’s development environment. After BleepingComputer alerted Target to the alleged breach, the exposed repositories were removed and Target’s internal Git server at git[.target[.com was taken offline and is no longer reachable, although independent verification of the full data dump and the breach itself remains unconfirmed. Source: