Yazılar

Hasbro Investigates Cyberattack, Takes Systems Offline

Hasbro has launched an investigation into a cybersecurity incident after detecting unauthorized access to its network on March 28.

The company said it engaged third-party cybersecurity experts to assess the breach and respond to the situation. As a precaution, Hasbro has taken certain systems offline and implemented temporary measures to continue processing orders and shipping products.

Despite these efforts, the company warned that disruptions could persist for several weeks, with potential delays in order fulfillment while systems are restored and secured.

Hasbro is still evaluating the full extent of the incident, including which data or files may have been affected. The situation underscores ongoing risks faced by large consumer and manufacturing firms as cyberattacks increasingly target operational infrastructure.

Following the disclosure, Hasbro’s shares declined in premarket trading, reflecting investor concern over possible operational and reputational impacts.

WhatsApp Uncovers Spyware Campaign Targeting Italian Users

WhatsApp has revealed that an Italian surveillance firm tricked around 200 users into downloading a fake version of its app embedded with spyware.

The campaign was attributed to ASIGINT, a subsidiary of SIO, which develops cyber intelligence tools for government and law enforcement clients. According to WhatsApp, the attack relied on deception, persuading victims to install malicious software disguised as the legitimate app.

The company described the operation as “highly targeted,” noting that most affected users were based in Italy. The spyware enabled unauthorized surveillance once installed, raising concerns about privacy and digital security.

Meta Platforms, which owns WhatsApp, has taken action to disrupt the campaign. However, details about the specific targets or the full scope of the surveillance have not been disclosed.

This marks the second major spyware-related incident in Italy within 15 months. A previous case involved software from Paragon, which led to a fallout between the company and Italian authorities.

The latest incident highlights the growing use of sophisticated social engineering tactics in cyber espionage, as well as ongoing concerns over the role of commercial surveillance tools in monitoring individuals.

Iran-Linked Hackers Restore Website After US Domain Seizure

A website linked to an Iranian government-associated hacking group has resurfaced just one day after U.S. authorities seized several of its domains, highlighting ongoing challenges in disrupting cyber threat actors.

The U.S. Department of Justice said it had seized four domains connected to the “Handala Hack Team,” which it linked to Iran’s Ministry of Intelligence and Security. The group had previously claimed responsibility for a cyberattack on a U.S. medical device company earlier in March.

Despite the takedown, the group quickly restored its online presence, stating that the action was an attempt by U.S. authorities to silence it. Analysts say such rapid recovery is common, as state-linked cyber units frequently re-establish operations using new domains or platforms.

The incident underscores the resilience of cyber threat actors and the limitations of domain seizures as a long-term deterrent. Experts note that these groups often maintain multiple backup channels, allowing them to resume activities with minimal disruption.

The case also highlights growing tensions in cyber operations, where government-linked hacking groups continue to play a role in both digital espionage and psychological operations.