🌐 hackmanac.com
🌐 hackrisk.io
As we step into 2026, cyber risk analysis needs more than isolated data points — it requires context and comparison.
Today, HackRisk introduces 𝐓𝐫𝐞𝐧𝐝 𝐂𝐨𝐦𝐩𝐚𝐫𝐢𝐬𝐨𝐧, a 𝐧𝐞𝐰 𝐩𝐫𝐞𝐦𝐢𝐮𝐦 𝐜𝐚𝐩𝐚𝐛𝐢𝐥𝐢𝐭𝐲 designed for professionals who rely on data to make strategic decisions.
1/3
🇨🇱Chile - Copec
Anubis hacking group claims to have breached Empresas Copec S.A.
🇨🇱Chile - Copec
Anubis hacking group claims to have breached Empresas Copec S.A.
🇪🇸Spain - Grupo Ruiz
Lynx hacking group claims to have breached Grupo Ruiz.
Samples have been provided.
Sector: Transportation
Threat class: Cybercrime
Observed: Jan 9, 2026
Status: Pending verification
🇪🇸Spain - Grupo Ruiz
Lynx hacking group claims to have breached Grupo Ruiz.
Samples have been provided.
Sector: Transportation
Threat class: Cybercrime
Observed: Jan 9, 2026
Status: Pending verification
🇮🇹Italy - Mutti
Cl0p hacking group claims to have breached Mutti.
Sector: Manufacturing
Threat class: Cybercrime
Observed: Jan 8, 2026
Status: Pending verification
🇮🇹Italy - Mutti
Cl0p hacking group claims to have breached Mutti.
Sector: Manufacturing
Threat class: Cybercrime
Observed: Jan 8, 2026
Status: Pending verification
🇲🇽Mexico - Universidad Intercultural de Baja California
The threat actor Evorax leaked the full database of Universidad Intercultural de Baja California in Mexico.
🇲🇽Mexico - Universidad Intercultural de Baja California
The threat actor Evorax leaked the full database of Universidad Intercultural de Baja California in Mexico.
🇧🇷Brazil - Universidade Federal de Sergipe
Vect hacking group claims to have breached Universidade Federal de Sergipe.
Allegedly, the attackers exfiltrated 150 GB of data, including financial records and students’ data.
🇧🇷Brazil - Universidade Federal de Sergipe
Vect hacking group claims to have breached Universidade Federal de Sergipe.
Allegedly, the attackers exfiltrated 150 GB of data, including financial records and students’ data.
🇺🇸US - Anteriad
Qilin hacking group claims to have breached Anteriad.
Allegedly, the attackers exfiltrated 3.0 TB of data.
Samples have been provided.
Sector: Professional
Threat class: Cybercrime
Observed: Jan 8, 2026
Status: Pending verification
🇺🇸US - Anteriad
Qilin hacking group claims to have breached Anteriad.
Allegedly, the attackers exfiltrated 3.0 TB of data.
Samples have been provided.
Sector: Professional
Threat class: Cybercrime
Observed: Jan 8, 2026
Status: Pending verification
🇮🇹Italy - Softlab SpA
Qilin hacking group claims to have breached Softlab SpA.
Sector: ICT
Threat class: Cybercrime
Observed: Jan 8, 2026
Status: Pending verification
🇮🇹Italy - Softlab SpA
Qilin hacking group claims to have breached Softlab SpA.
Sector: ICT
Threat class: Cybercrime
Observed: Jan 8, 2026
Status: Pending verification
🇯🇵Japan - Kowa Emori Co., Ltd. [興和江守]
On January 7, 2026, Kowa Emori Co., Ltd., reported a ransomware attack that caused a major system disruption.
As of the initial disclosure, no data leakage has been confirmed, but order and shipment operations have been delayed.
🇯🇵Japan - Kowa Emori Co., Ltd. [興和江守]
On January 7, 2026, Kowa Emori Co., Ltd., reported a ransomware attack that caused a major system disruption.
As of the initial disclosure, no data leakage has been confirmed, but order and shipment operations have been delayed.
🇺🇸US - Vanguard
Threat actor Solonik claims to have breached Vanguard.
According to the post, the attacker accessed a dataset containing 22.5 million records of U.S. ETF and asset management clients.
🇺🇸US - Vanguard
Threat actor Solonik claims to have breached Vanguard.
According to the post, the attacker accessed a dataset containing 22.5 million records of U.S. ETF and asset management clients.
🇯🇵Japan - Smaregi [スマレジ]
lulzintel threat actor claims to have breached Smaregi.
Allegedly, the attackers leaked a database exposing the personal information of 100,000 customers, including full names and phone numbers.
🇯🇵Japan - Smaregi [スマレジ]
lulzintel threat actor claims to have breached Smaregi.
Allegedly, the attackers leaked a database exposing the personal information of 100,000 customers, including full names and phone numbers.
🇵🇪Peru - Autoridad Nacional del Agua
BlackShrantac hacking group claims to have breached Autoridad Nacional del Agua.
🇵🇪Peru - Autoridad Nacional del Agua
BlackShrantac hacking group claims to have breached Autoridad Nacional del Agua.
🇵🇪Peru - Peru's National Citizen Database
Solonik threat actor claims to have breached Peru's National Citizen Database.
🇵🇪Peru - Peru's National Citizen Database
Solonik threat actor claims to have breached Peru's National Citizen Database.
🇲🇽Mexico - Universidad Nacional Autónoma de México (UNAM)
ByteToBreach threat actor claims to have breached Universidad Nacional Autónoma de México (UNAM), using an F5 BIG-IP vulnerability to move laterally across the network and deploy custom ransomware mainly for data exfiltration.
🇲🇽Mexico - Universidad Nacional Autónoma de México (UNAM)
ByteToBreach threat actor claims to have breached Universidad Nacional Autónoma de México (UNAM), using an F5 BIG-IP vulnerability to move laterally across the network and deploy custom ransomware mainly for data exfiltration.
🇯🇵Japan - ITmedia Inc. issued a security alert about a phishing campaign involving spoofed emails.
Attackers are impersonating ITmedia using a non-existent email address to send mass phishing emails to random recipients.
🇯🇵Japan - ITmedia Inc. issued a security alert about a phishing campaign involving spoofed emails.
Attackers are impersonating ITmedia using a non-existent email address to send mass phishing emails to random recipients.
🇯🇵Japan - Gurunavi (Rakuten Gurunavi)
daghetiaw threat actor claims to have breached Gurunavi.
Allegedly, the attackers exfiltrated over 639,000 records, including emails, phone numbers, addresses, reservation details, user names, restaurant data, prices, and orders.
🇯🇵Japan - Gurunavi (Rakuten Gurunavi)
daghetiaw threat actor claims to have breached Gurunavi.
Allegedly, the attackers exfiltrated over 639,000 records, including emails, phone numbers, addresses, reservation details, user names, restaurant data, prices, and orders.
Hack Tuesday: Week 31 Dec 2025 - 06 Jan 2026
⚠️269 cyber attacks across 46 countries ⚠️
More details:
hackmanac.com/news/hack-tu...
Hack Tuesday: Week 31 Dec 2025 - 06 Jan 2026
⚠️269 cyber attacks across 46 countries ⚠️
More details:
hackmanac.com/news/hack-tu...
🇲🇽Mexico - Gobierno del Estado de Baja California
Tengu hacking group claims to have breached Gobierno del Estado de Baja California.
Allegedly, the attackers exfiltrated 50 GB of data.
Ransom deadline: 13th Jan. 2026
🇲🇽Mexico - Gobierno del Estado de Baja California
Tengu hacking group claims to have breached Gobierno del Estado de Baja California.
Allegedly, the attackers exfiltrated 50 GB of data.
Ransom deadline: 13th Jan. 2026
🇯🇵Japan - Asahi Shimbun Warns of Reporter Impersonation Scam Emails
On January 6, 2026, The Asahi Shimbun warned of impersonation emails sent by scammers posing as its reporters using fake names and departments.
🇯🇵Japan - Asahi Shimbun Warns of Reporter Impersonation Scam Emails
On January 6, 2026, The Asahi Shimbun warned of impersonation emails sent by scammers posing as its reporters using fake names and departments.
🇮🇩Indonesia - PT Matahari Department Store Tbk
betway threat actor claims to have breached PT Matahari Department Store Tbk.
🇮🇩Indonesia - PT Matahari Department Store Tbk
betway threat actor claims to have breached PT Matahari Department Store Tbk.
🇯🇵Japan - Emurasoft, Inc. (EmEditor)
Between December 31, 2025, and January 2, 2026, the EmEditor website was compromised, and the Windows installer download was replaced with a malware-infected file signed with a short-lived Microsoft certificate, making it appear legitimate.
🇯🇵Japan - Emurasoft, Inc. (EmEditor)
Between December 31, 2025, and January 2, 2026, the EmEditor website was compromised, and the Windows installer download was replaced with a malware-infected file signed with a short-lived Microsoft certificate, making it appear legitimate.
1/6
1/6
As we step into 2026, cyber risk analysis needs more than isolated data points — it requires context and comparison.
Today, HackRisk introduces 𝐓𝐫𝐞𝐧𝐝 𝐂𝐨𝐦𝐩𝐚𝐫𝐢𝐬𝐨𝐧, a 𝐧𝐞𝐰 𝐩𝐫𝐞𝐦𝐢𝐮𝐦 𝐜𝐚𝐩𝐚𝐛𝐢𝐥𝐢𝐭𝐲 designed for professionals who rely on data to make strategic decisions.
1/3
As we step into 2026, cyber risk analysis needs more than isolated data points — it requires context and comparison.
Today, HackRisk introduces 𝐓𝐫𝐞𝐧𝐝 𝐂𝐨𝐦𝐩𝐚𝐫𝐢𝐬𝐨𝐧, a 𝐧𝐞𝐰 𝐩𝐫𝐞𝐦𝐢𝐮𝐦 𝐜𝐚𝐩𝐚𝐛𝐢𝐥𝐢𝐭𝐲 designed for professionals who rely on data to make strategic decisions.
1/3
Ledger had another data breach via payment processor Global-e leaking the personal data of customers (name & other contact information).
Source: x.com/zachxbt/stat...
Ledger had another data breach via payment processor Global-e leaking the personal data of customers (name & other contact information).
Source: x.com/zachxbt/stat...
🇸🇬Singapore - Bolttech
Everest hacking group claims to have breached Bolttech.
🇸🇬Singapore - Bolttech
Everest hacking group claims to have breached Bolttech.