French authorities confirmed that the Ministry of the Interior was recently affected by a cyber intrusion that impacted its email infrastructure. The breach was detected during the night between Thursday 11 to Friday, 12 December, allowing unauthorized access to certain document files stored on internal systems. At this stage, officials have not verified whether any data was extracted. In response, the ministry immediately reinforced security measures, including stricter access controls and enhanced protection of its information systems. An official investigation has been launched to identify both the source and the full extent of the attack. Interior Minister Laurent Nuñez stated that several scenarios are being considered, ranging from foreign state-linked interference to activist-driven actions intended to expose weaknesses in government networks, as well as financially motivated cybercrime. While confirming that protective protocols were activated following the intrusion, he emphasized that investigators have not yet determined who was behind the operation or what their exact objectives were. Given its role in overseeing national police forces, internal security, and immigration services, the Interior Ministry represents a particularly attractive target for sophisticated threat actors. France has previously attributed multiple cyber campaigns against public and private institutions to advanced persistent threat groups, including APT28, which has been linked to Russian military intelligence. Past assessments by the national cybersecurity agency have shown that such actors have targeted a broad spectrum of French entities, and in recent years have focused on exploiting vulnerabilities in email servers to gather sensitive political and strategic information across Europe and North America.
Since late 2025, multiple organizations in Japan have been impacted by an active exploitation campaign targeting a critical flaw in React and Next.js applications. The issue, track...
SantaStealer is an emerging malware-as-a-service (MaaS) infostealer currently advertised across Telegram channels and underground cybercrime forums. Promoted as a stealth, memory-r...
Security researchers have uncovered a newly active Android banking malware known as FrogBlight, which is being used in targeted mobile attack campaigns primarily aimed at users in ...