Cyberabbit Logo

Cyberabbit Stories

From breach logs to nation-state playbooks.

Dispatch Log

Every story is long-form with sourced evidence, timeline graphics, and actionable takeaways.

The newsroom tracks every major and medium-sized incident that matters to defenders, CISOs, and investigators. Each brief references public filings, regulatory notices, and analyst coverage so you can cite the work from your war room.

Government documents overlayed by red ransomware banners

Conduent Breach

Conduent breach deep dive

Timeline from the Jan 2025 ransomware attack to the latest 2026 disclosures, plus examination of the 8 TB trove, SafePay’s claims, and the state agencies still notifying citizens.

  • States now report 25M+ records exposed (TechCrunch, Malwarebytes).
  • Medical, SSNs, and benefits data spread across 30+ programs.
  • Analysis of notification delays and regulator expectations.
Space agency control room with network overlay

ESA Exposure

ESA double intrusion dossier

Dual leaks of 200 GB and 500 GB. We detail the evidence, why the same hole was reused, and how contractors are affected.

  • Paubox confirmed data offered for sale on BreachForums.
  • Victim data included source code, Terraform, CI/CD, and Bitbucket repos.
  • Analysis of ESA’s incident history and recovery posture.
Dark silhouette of a threat actor in a hoodie with digital overlays

ShinyHunters

Social engineering spree and luxury fines

We decoded how a syndicate keeps breaking into customer datasets, why regulators landed $25M fines, and how organizations can inoculate their CRM and knowledge workers.

  • Figure incident exposed 2.56 GB via a social engineering attack.
  • Dior, Louis Vuitton, and Tiffany were fined ₩36B for poor safeguards.
  • Crunchbase and other SaaS platforms also targeted with voice phishing.
City skyline with glowing telecom towers and stealthy access lines

Telco Espionage

Salt Typhoon, UNC3886, and the Odido fallout

A strategic look at how Chinese-linked threat actors touched telco control planes, plus the Odido data dump’s customer info scope.

  • UNC3886 (Salt Typhoon) targeted Singapore telcos without service impact.
  • Odido confirms 6.2M+ customers with IBAN and passport data stolen.
  • Why telcos remain high-value targets for espionage and fraud.