Eurofiber, a European fiber-optic network operator, announced that a threat actor breached its ticket management platform and the ATE customer portal in an incident detected on November 13. The breach was caused by a vulnerability that allowed hackers to exfiltrate data stored on the compromised systems. The ticketing platform affected is used by Eurofiber France and its regional brands—Avelia, Eurafibre, FullSave, and Netiwan. In addition, the ATE portal is used by customers of Eurofiber Cloud Infra France, the company’s cloud division. According to Eurofiber, the incident remained confined to customers in France, and operations for Belgium, Germany, and the Netherlands remained unaffected. Upon detection, Eurofiber isolated the breached systems, patched the exploited vulnerability, and deployed additional security measures. The company assured that sensitive financial information and critical data from other systems were unaffected, and all services remained fully operational during the attack. Eurofiber has also contacted the affected customers, notified the relevant authorities, and filed a report mentioning an extortion attempt, without providing further details about the stolen data, number of victims, or identity of the attackers. External threat intelligence suggests the breach may have been more extensive than initially disclosed. According to SOCRadar, the attackers infiltrated Eurofiber's GLPI IT service management platform, which handles IT assets, configuration data, and customer environments. The threat actor reportedly accessed support tickets, internal messages, configuration files, VPN settings, credentials, API keys, tokens, SQL backups, source code, and various internal documents. Around 10,000 customers appear to have been affected, including government entities. A threat actor identified as ByteToBreach claimed responsibility in an underground forum and said they breached the company by exploiting a web-accessible GLPI interface via SQL injection. Over a 10-day period, they extracted around 10,000 password hashes and used stolen API keys and other secrets to download documents and further configuration data.
A critical security flaw in Oracle WebLogic Server has rapidly become a prime target for attackers worldwide. Identified as CVE-2026-21962, the issue carries the highest possible s...
A new Windows malware called ResokerRAT has been discovered, which allows attackers to secretly control infected systems. This malware uses Telegram instead of traditional servers ...
A vulnerability has been identified in Google Cloud’s Vertex AI platform that could allow unauthorized users to access sensitive data associated with machine learning workloads. ...