#shinyhunters — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #shinyhunters, aggregated by home.social.
-
"Agreement:" reached in ShinyHunter's breach of Infrastructure's Canvas LMS .... the cybercrime gang returned the stolen data (which includes usernames, email addresses, course names, enrollment information, and messages) and provided shred logs confirming its destruction.
While not confirmed, it looks like a ransom payment was made. A webinar on May 13 may provide more details. https://www.instructure.com/incident_update #Breach #Hackers #ShinyHunters #Infrastructure #CanvasLMS #LMS #StudentData #DataPrivacy #Ransom #RansomWare #CyberCrime
-
From #CheckPoint Research:
Canvas Data Breach
#Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.
https://research.checkpoint.com/2026/11th-may-threat-intelligence-report/
-
Moodle and D2L gangs stay winning #academicChatter #academicMastodon #canvas #shinyHunters
-
When asked for a comment, a spokesperson for Anthology, the parent company of Canvas competitor Blackboard, (probably would have) said "Well, Well, Well, it's not So easy To Find A Learning Management System that doesn't suck shit, now is it?"
-
Remember kids, crime doesn't pay. Except for all the times that it does pay...
-
Restablecen el sistema Canvas tras un ciberataque global que afectó a miles de instituciones
Decenas de miles de estudiantes recuperaron el acceso a la plataforma de aprendizaje Canvas luego de que un ataque del grupo ShinyHunters interrumpiera las actividades en 9,000 escuelas y universidades en plena temporada de exámenes finales (Fuente SecurityWeek).
La plataforma Canvas, propiedad de Instructure, ha vuelto a estar operativa tras sufrir uno de los mayores ciberataques registrados en el sector educativo. El incidente, que comenzó a detectarse a finales de abril pero escaló drásticamente el 7 de mayo, obligó a la compañía a desconectar el sistema a nivel mundial para contener una intrusión que permitió a los atacantes alterar las páginas de inicio de los usuarios con mensajes de extorsión y amenazas de filtración de datos.
Según las investigaciones, el grupo de hacking ShinyHunters explotó una vulnerabilidad vinculada a las cuentas de tipo «Free-For-Teacher» para acceder a unos 3.6 terabytes de información. Los datos comprometidos incluyen nombres, correos electrónicos, números de identificación estudiantil y millones de mensajes privados entre alumnos y profesores. Aunque Instructure asegura que no hay pruebas de que contraseñas o datos financieros hayan sido robados, instituciones de renombre —incluyendo todas las de la Ivy League y universidades en Canadá, Europa y Australia— han emitido alertas ante el riesgo de campañas de phishing altamente dirigidas que utilicen el contexto académico real de los usuarios.
El impacto del apagón fue crítico, coincidiendo con el cierre de semestre y exámenes finales en Estados Unidos y otras regiones, lo que forzó a reprogramar evaluaciones y extender plazos de entrega. Aunque el servicio se ha restablecido para la mayoría, el grupo atacante ha fijado el 12 de mayo como fecha límite para el pago de un rescate antes de filtrar la información robada, manteniendo en vilo a la comunidad educativa global sobre la privacidad de sus registros personales.
#arielmcorg #canvas #ciberataque #educacion #hacking #instructure #PORTADA #SeguridadInformatica #shinyhunters #tecnologia -
ShinyHunters Breach Exposes 200,000 Zara Customers
A massive data breach at fashion giant Zara has exposed the sensitive information of over 197,000 customers, including email addresses, order details, and support ticket info, after a hacking group called ShinyHunters gained unauthorized access to the company's systems. The breach was quickly contained, with parent company Inditex alerting authorities and…
-
ShinyHunters reportedly defaced Canvas login portals at about 330 schools after another breach of Instructure systems, demanding ransom payments before May 12 🎓
Attackers claim stolen Canvas data includes messages, enrollments, and user records 🔐#TechNews #Canvas #Instructure #ShinyHunters #Cybersecurity #DataBreach #Education #Privacy #Infosec #SaaS #SSO #Cloud #Ransomware #OpenSource #Security #Hacking #Breach #Extortion
-
“There's personal circumstances, medical circumstances, accessibility accommodations, disputes, sexual assault allegations… If that information is out across hundreds of millions of people, there's a lot of harm that's going to happen.”
-
The #Canvas #Hack Is a New Kind of #Ransomware Debacle
Thousands of #schools around the US were paralyzed on Thursday after #education tech firm Instructure shut down access to its Canvas platform following a #breach by #hackers going by the name #ShinyHunters.
#security #privacyhttps://www.wired.com/story/canvas-hack-shinyhunters-ransomware-instructure/
-
I trained on and became among the earliest users of #WebCT in 2000, teaching fully online in 2001 and 2002. It is now called #Canvas, which is one of the largest and most notable hacks of all time, effected by #shinyhunters. #UCSD uses it, and I presume classes will resume, say by email and in person. In recent years I had dumped Canvas except for one huge lecture with TAs where the gradebook was really useful. Not using it this quarter at all, lucky me. Returning to a printed syllabus in future
-
I trained on and became among the earliest users of #WebCT in 2000, teaching fully online in 2001 and 2002. It is now called #Canvas, which is one of the largest and most notable hacks of all time, effected by #shinyhunters. #UCSD uses it, and I presume classes will resume, say by email and in person. In recent years I had dumped Canvas except for one huge lecture with TAs where the gradebook was really useful. Not using it this quarter at all, lucky me. Returning to a printed syllabus in future
-
I trained on and became among the earliest users of #WebCT in 2000, teaching fully online in 2001 and 2002. It is now called #Canvas, which is one of the largest and most notable hacks of all time, effected by #shinyhunters. #UCSD uses it, and I presume classes will resume, say by email and in person. In recent years I had dumped Canvas except for one huge lecture with TAs where the gradebook was really useful. Not using it this quarter at all, lucky me. Returning to a printed syllabus in future
-
I trained on and became among the earliest users of #WebCT in 2000, teaching fully online in 2001 and 2002. It is now called #Canvas, which is one of the largest and most notable hacks of all time, effected by #shinyhunters. #UCSD uses it, and I presume classes will resume, say by email and in person. In recent years I had dumped Canvas except for one huge lecture with TAs where the gradebook was really useful. Not using it this quarter at all, lucky me. Returning to a printed syllabus in future
-
I trained on and became among the earliest users of #WebCT in 2000, teaching fully online in 2001 and 2002. It is now called #Canvas, which is one of the largest and most notable hacks of all time, effected by #shinyhunters. #UCSD uses it, and I presume classes will resume, say by email and in person. In recent years I had dumped Canvas except for one huge lecture with TAs where the gradebook was really useful. Not using it this quarter at all, lucky me. Returning to a printed syllabus in future
-
Offense Just Got a Co-Pilot.
The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used #Claude and #ChatGPT to assist an intrusion into a water utility in Monterrey. The OT #breach ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.
This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making #OT infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.
→ Week #19/2026 also covers: A 64-day cPanel zero-day window, #ShinyHunters hits an ed-tech giant, and Europe blocks #Huawei from its solar grid.
Full issue 👉 https://infosec-mashup.santolaria.net/p/infosec-mashup-19-2026-offense-just-got-a-co-pilot
If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI
-
Offense Just Got a Co-Pilot.
The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used #Claude and #ChatGPT to assist an intrusion into a water utility in Monterrey. The OT #breach ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.
This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making #OT infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.
→ Week #19/2026 also covers: A 64-day cPanel zero-day window, #ShinyHunters hits an ed-tech giant, and Europe blocks #Huawei from its solar grid.
Full issue 👉 https://infosec-mashup.santolaria.net/p/infosec-mashup-19-2026-offense-just-got-a-co-pilot
If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI
-
Offense Just Got a Co-Pilot.
The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used #Claude and #ChatGPT to assist an intrusion into a water utility in Monterrey. The OT #breach ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.
This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making #OT infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.
→ Week #19/2026 also covers: A 64-day cPanel zero-day window, #ShinyHunters hits an ed-tech giant, and Europe blocks #Huawei from its solar grid.
Full issue 👉 https://infosec-mashup.santolaria.net/p/infosec-mashup-19-2026-offense-just-got-a-co-pilot
If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI
-
Offense Just Got a Co-Pilot.
The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used #Claude and #ChatGPT to assist an intrusion into a water utility in Monterrey. The OT #breach ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.
This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making #OT infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.
→ Week #19/2026 also covers: A 64-day cPanel zero-day window, #ShinyHunters hits an ed-tech giant, and Europe blocks #Huawei from its solar grid.
Full issue 👉 https://infosec-mashup.santolaria.net/p/infosec-mashup-19-2026-offense-just-got-a-co-pilot
If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI
-
Offense Just Got a Co-Pilot.
The story that should not get buried under this week's patch pile is a quiet one from the ICS/OT section: attackers used #Claude and #ChatGPT to assist an intrusion into a water utility in Monterrey. The OT #breach ultimately failed — but that's almost beside the point. What the Dragos report actually documents is AI being used as a competent recon assistant: autonomously identifying a vNode SCADA/IIoT interface, recommending a password-spray attack, and generating a Python toolkit on the fly. No novel exploit. No nation-state budget. Just patience and a chat window.
This is the part of the AI-in-security conversation that tends to get lost between the breathless vendor marketing and the "fully autonomous AI attacks are not yet observed" reassurances. The threat doesn't need to be autonomous to be meaningful. Lowering the reconnaissance floor — making #OT infrastructure more legible to attackers who previously lacked the domain knowledge to navigate it — is already a significant capability shift. The Monterrey incident didn't succeed. The next one will be run by someone who learned from it.
→ Week #19/2026 also covers: A 64-day cPanel zero-day window, #ShinyHunters hits an ed-tech giant, and Europe blocks #Huawei from its solar grid.
Full issue 👉 https://infosec-mashup.santolaria.net/p/infosec-mashup-19-2026-offense-just-got-a-co-pilot
If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI
-
#Cyberattack hits #Canvas system used by thousands of schools as #finals loom
By HEATHER HOLLINGSWORTH
Updated 11:19 PM EDT, May 7, 2026Excerpt: "Connolly said the Canvas attack is strikingly similar to a breach at #PowerSchool, which also offers learning management tools [#LMS]. In that case a Massachusetts college student was charged.
"Connolly described #ShinyHunters as a loose affiliation of teenagers and young adults based in the U.S. and the United Kingdom. The group also has been tied to a other attacks, including one aimed at #LiveNation’s #Ticketmaster subsidiary."
#CanvasLMS #Instructure #CanvasPlatform #Cyberattack #CanvasSoftware #Education #Technology #Databreach
-
#Canvas login portals for 15,000 institutions, including top universities like Harvard and Oxford, has exfiltrated 3.65 terabytes of student and faculty data in their boldest attempt at monetizing stolen data since announcing itself as #ShinyHunters in 2020.
This massive black hat #BigEdu data security attack runs alongside concurrent supply chain grift attacks on corporate players like #Vimeo #WynnResorts #Snowflake and #Zara, exposing critical flaws in #EdTech & #Corporate #InfoSec partcularly protocol for third-party vendor trust.
The nefarious #ShinyHunters cabal has infiltrated over 400+ organizations in #SAAS & #DRM data breaches including #Google #Salesforce #Workday, #Crunchbase, #Gucci, #Coinbase, and #Qantas airlines not to mention so called "Security" professionals such as #CrowdStrike and #ADT
https://www.pcmag.com/news/video-platform-vimeo-hacked-by-shinyhunters-gang
https://www.docontrol.io/blog/shinyhunters
https://www.securityweek.com/wynn-resorts-says-21000-employees-affected-by-shinyhunters-hack/
https://www.reco.ai/blog/shinyhunters-data-breach-vs-saas-why-dynamic-security-matters
-
#Canvas login portals for 15,000 institutions, including top universities like Harvard and Oxford, has exfiltrated 3.65 terabytes of student and faculty data in their boldest attempt at monetizing stolen data since announcing itself as #ShinyHunters in 2020.
This massive black hat #BigEdu data security attack runs alongside concurrent supply chain grift attacks on corporate players like #Vimeo #WynnResorts #Snowflake and #Zara, exposing critical flaws in #EdTech & #Corporate #InfoSec partcularly protocol for third-party vendor trust.
The nefarious #ShinyHunters cabal has infiltrated over 400+ organizations in #SAAS & #DRM data breaches including #Google #Salesforce #Workday, #Crunchbase, #Gucci, #Coinbase, and #Qantas airlines not to mention so called "Security" professionals such as #CrowdStrike and #ADT
https://www.pcmag.com/news/video-platform-vimeo-hacked-by-shinyhunters-gang
https://www.docontrol.io/blog/shinyhunters
https://www.securityweek.com/wynn-resorts-says-21000-employees-affected-by-shinyhunters-hack/
https://www.reco.ai/blog/shinyhunters-data-breach-vs-saas-why-dynamic-security-matters
-
#Canvas login portals for 15,000 institutions, including top universities like Harvard and Oxford, has exfiltrated 3.65 terabytes of student and faculty data in their boldest attempt at monetizing stolen data since announcing itself as #ShinyHunters in 2020.
This massive black hat #BigEdu data security attack runs alongside concurrent supply chain grift attacks on corporate players like #Vimeo #WynnResorts #Snowflake and #Zara, exposing critical flaws in #EdTech & #Corporate #InfoSec partcularly protocol for third-party vendor trust.
The nefarious #ShinyHunters cabal has infiltrated over 400+ organizations in #SAAS & #DRM data breaches including #Google #Salesforce #Workday, #Crunchbase, #Gucci, #Coinbase, and #Qantas airlines not to mention so called "Security" professionals such as #CrowdStrike and #ADT
https://www.pcmag.com/news/video-platform-vimeo-hacked-by-shinyhunters-gang
https://www.docontrol.io/blog/shinyhunters
https://www.securityweek.com/wynn-resorts-says-21000-employees-affected-by-shinyhunters-hack/
https://www.reco.ai/blog/shinyhunters-data-breach-vs-saas-why-dynamic-security-matters
-
This Week in Security: Another Linux Exploit, Ubuntu Knocked Offline, Finals Interrupted, and Backdoored Tools
-
This Week in Security: Another Linux Exploit, Ubuntu Knocked Offline, Finals Interrupted, and Backdoored Tools
-
If anyone coming across this post is at an institution that uses Canvas, please send me links/images of how your IT depts are announcing the outage. I'm going to be collating pages over the coming days, but there's thousands of Canvas schools and only one of me!
-
Some more directly say "this isn't an *us* problem" while others are more general -- for students trying to turn in work and profs just trying to grade, the distinction of *who* is actually responsible is probably not the top priority right now
-
Canvas, which is used by a huge number of US colleges and universities, has been targeted by a cyberattack -- I've been doing work on the "platformization" and neoliberalization of higher education. I'm really interested in how institutions that are doing crisis comms right now are positioning themselves vis-a-vis Instructure and Canvas.
-
DATE: May 1, 2026 at 03:41PM
SOURCE: HEALTHCARE INFO SECURITYDirect article link at end of text block below.
#Medtronic Already Facing Federal Lawsuits in Recent #Hack Claimed by #ShinyHunters https://t.co/hxxl5gIhft
Here are any URLs found in the article text:
Articles can be found by scrolling down the page at https://www.healthcareinfosecurity.com/ under the title "Latest"
-------------------------------------------------
Private, vetted email list for mental health professionals: https://www.clinicians-exchange.org
Healthcare security & privacy posts not related to IT or infosec are at @HIPAABot . Even so, they mix in some infosec with the legal & regulatory information.
-------------------------------------------------
#security #healthcare #doctors #itsecurity #hacking #doxxing #psychotherapy #securitynews #psychotherapist #mentalhealth #psychiatry #hospital #socialwork #datasecurity #webbeacons #cookies #HIPAA #privacy #datanalytics #healthcaresecurity #healthitsecurity #patientrecords @infosec #telehealth #netneutrality #socialengineering
-
DATE: April 27, 2026 at 05:40PM
SOURCE: HEALTHCARE INFO SECURITYDirect article link at end of text block below.
#MedicalDevice Maker #Medtronic Says It's Been Hacked https://t.co/aQ9A5rA9ic #ShinyHunters
Here are any URLs found in the article text:
Articles can be found by scrolling down the page at https://www.healthcareinfosecurity.com/ under the title "Latest"
-------------------------------------------------
Private, vetted email list for mental health professionals: https://www.clinicians-exchange.org
Healthcare security & privacy posts not related to IT or infosec are at @HIPAABot . Even so, they mix in some infosec with the legal & regulatory information.
-------------------------------------------------
#security #healthcare #doctors #itsecurity #hacking #doxxing #psychotherapy #securitynews #psychotherapist #mentalhealth #psychiatry #hospital #socialwork #datasecurity #webbeacons #cookies #HIPAA #privacy #datanalytics #healthcaresecurity #healthitsecurity #patientrecords @infosec #telehealth #netneutrality #socialengineering
-
#RockstarGames: Kriminelle Gang veröffentlicht Daten | Security https://www.heise.de/news/Rockstar-Games-Kriminelle-Gang-veroeffentlicht-Daten-11255795.html #ShinyHunters #DataLeak #Datenleck #CyberCrime #Rockstar
-
📬 GTA Shark Cards: Gamer geben bis zu 1 Mio. US-Dollar aus
#Cyberangriffe #Gaming #GTAOnline #GTASharkCards #Heist #Monetarisierungsdesign #RedDeadOnline #RockstarGames #ShinyHunters https://sc.tarnkappe.info/806ab7 -
📬 GTA Shark Cards: Gamer geben bis zu 1 Mio. US-Dollar aus
#Cyberangriffe #Gaming #GTAOnline #GTASharkCards #Heist #Monetarisierungsdesign #RedDeadOnline #RockstarGames #ShinyHunters https://sc.tarnkappe.info/806ab7 -
#Rockstar bestätigt Cyberangriff und Datendiebstahl | heise online https://www.heise.de/news/Rockstar-bestaetigt-Cyberangriff-und-Datendiebstahl-11253467.html #ShinyHunters #RockstarGames #DataLeak #Datenleck #CyberCrime
-
📢⚠️ HackerOne, Mazda, Infinite Campus, and the Dutch Ministry have all confirmed separate data breaches, exposing employee and partner data across sectors.
Read more: https://hackread.com/hackerone-mazda-infinite-campus-dutch-ministry-data-breaches/
-
Nou, ik hoor er nu officieel bij hoor: op het e-mailadres dat gejat is bij de inbraak bij Odido kwam zojuist de eerste phishing-mail binnen.
Dat adres heb ik speciaal aangemaakt voor Odido (of nee, toen heette het nog T-Mobile), dus niemand anders zou dat adres moeten kennen. Behalve dat tuig natuurlijk.
Voor wat ze via e-mail proberen, ben ik niet bang: ik ben door en door bekend met e-mail en beroepsmatig paranoïde. Waar ik me wel wat zorgen over maak, is dat er natuurlijk ook een kopie van mijn paspoort en mijn bankrekeningnummer gejat zijn...
#Odido #hack #lek #ShinyHunters -
Nou, ik hoor er nu officieel bij hoor: op het e-mailadres dat gejat is bij de inbraak bij Odido kwam zojuist de eerste phishing-mail binnen.
Dat adres heb ik speciaal aangemaakt voor Odido (of nee, toen heette het nog T-Mobile), dus niemand anders zou dat adres moeten kennen. Behalve dat tuig natuurlijk.
Voor wat ze via e-mail proberen, ben ik niet bang: ik ben door en door bekend met e-mail en beroepsmatig paranoïde. Waar ik me wel wat zorgen over maak, is dat er natuurlijk ook een kopie van mijn paspoort en mijn bankrekeningnummer gejat zijn...
#Odido #hack #lek #ShinyHunters -
Nou, ik hoor er nu officieel bij hoor: op het e-mailadres dat gejat is bij de inbraak bij Odido kwam zojuist de eerste phishing-mail binnen.
Dat adres heb ik speciaal aangemaakt voor Odido (of nee, toen heette het nog T-Mobile), dus niemand anders zou dat adres moeten kennen. Behalve dat tuig natuurlijk.
Voor wat ze via e-mail proberen, ben ik niet bang: ik ben door en door bekend met e-mail en beroepsmatig paranoïde. Waar ik me wel wat zorgen over maak, is dat er natuurlijk ook een kopie van mijn paspoort en mijn bankrekeningnummer gejat zijn...
#Odido #hack #lek #ShinyHunters -
Nou, ik hoor er nu officieel bij hoor: op het e-mailadres dat gejat is bij de inbraak bij Odido kwam zojuist de eerste phishing-mail binnen.
Dat adres heb ik speciaal aangemaakt voor Odido (of nee, toen heette het nog T-Mobile), dus niemand anders zou dat adres moeten kennen. Behalve dat tuig natuurlijk.
Voor wat ze via e-mail proberen, ben ik niet bang: ik ben door en door bekend met e-mail en beroepsmatig paranoïde. Waar ik me wel wat zorgen over maak, is dat er natuurlijk ook een kopie van mijn paspoort en mijn bankrekeningnummer gejat zijn...
#Odido #hack #lek #ShinyHunters -
El cíclope de los préstamos fintech, Figure, confirma la violación de datos #cibercrimen #ciberseguridad #confirma #datos #Figura #Figura_Tecnología #Figure #FinTech #gigante #hackers #hacking #infosec #los #préstamos #shinyhunters #violación #ButterWord #Spanish_News Comenta tu opinión 👇
https://butterword.com/el-ciclope-de-los-prestamos-fintech-figure-confirma-la-violacion-de-datos/?feed_id=69566&_unique_id=698f9d579d49e -
📬 BreachForums Comeback, doch für wie lange?
#DarkCommerce #Szene #Baphomet #BreachForums #hollow #Indra #Ministèredel’Intérieur #pompompurin #ShinyHunters https://sc.tarnkappe.info/88a796 -
📬 BreachForums Comeback, doch für wie lange?
#DarkCommerce #Szene #Baphomet #BreachForums #hollow #Indra #Ministèredel’Intérieur #pompompurin #ShinyHunters https://sc.tarnkappe.info/88a796 -
Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’
https://krebsonsecurity.com/2025/11/meet-rey-the-admin-of-scattered-lapsus-hunters/
#U.S.CentersforDiseaseControlandPrevention #ScatteredLAPSUS$Hunters #cybero5tdev@proton.me #Ne'er-Do-WellNews #SchneiderElectric #Cyb3rDrag0nzTeam #SaifAl-DinKhader #ALittleSunshine #ScatteredSpider #OrangeRomania #BreachForums #ShinyHunters #Breadcrumbs #CrowdStrike #Disney/Hulu #SentinelOne #ShinySp1d3r #Ransomware #Flashpoint #Hikki-Chan #Telefonica #o5tdev
-
Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’
https://krebsonsecurity.com/2025/11/meet-rey-the-admin-of-scattered-lapsus-hunters/
#U.S.CentersforDiseaseControlandPrevention #ScatteredLAPSUS$Hunters #cybero5tdev@proton.me #Ne'er-Do-WellNews #SchneiderElectric #Cyb3rDrag0nzTeam #SaifAl-DinKhader #ALittleSunshine #ScatteredSpider #OrangeRomania #BreachForums #ShinyHunters #Breadcrumbs #CrowdStrike #Disney/Hulu #SentinelOne #ShinySp1d3r #Ransomware #Flashpoint #Hikki-Chan #Telefonica #o5tdev
-
Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’
https://krebsonsecurity.com/2025/11/meet-rey-the-admin-of-scattered-lapsus-hunters/
#U.S.CentersforDiseaseControlandPrevention #ScatteredLAPSUS$Hunters #cybero5tdev@proton.me #Ne'er-Do-WellNews #SchneiderElectric #Cyb3rDrag0nzTeam #SaifAl-DinKhader #ALittleSunshine #ScatteredSpider #OrangeRomania #BreachForums #ShinyHunters #Breadcrumbs #CrowdStrike #Disney/Hulu #SentinelOne #ShinySp1d3r #Ransomware #Flashpoint #Hikki-Chan #Telefonica #o5tdev
-
Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’
https://krebsonsecurity.com/2025/11/meet-rey-the-admin-of-scattered-lapsus-hunters/
#U.S.CentersforDiseaseControlandPrevention #ScatteredLAPSUS$Hunters #cybero5tdev@proton.me #Ne'er-Do-WellNews #SchneiderElectric #Cyb3rDrag0nzTeam #SaifAl-DinKhader #ALittleSunshine #ScatteredSpider #OrangeRomania #BreachForums #ShinyHunters #Breadcrumbs #CrowdStrike #Disney/Hulu #SentinelOne #ShinySp1d3r #Ransomware #Flashpoint #Hikki-Chan #Telefonica #o5tdev
-
Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’
https://krebsonsecurity.com/2025/11/meet-rey-the-admin-of-scattered-lapsus-hunters/
#U.S.CentersforDiseaseControlandPrevention #ScatteredLAPSUS$Hunters #cybero5tdev@proton.me #Ne'er-Do-WellNews #SchneiderElectric #Cyb3rDrag0nzTeam #SaifAl-DinKhader #ALittleSunshine #ScatteredSpider #OrangeRomania #BreachForums #ShinyHunters #Breadcrumbs #CrowdStrike #Disney/Hulu #SentinelOne #ShinySp1d3r #Ransomware #Flashpoint #Hikki-Chan #Telefonica #o5tdev
-
Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’ https://krebsonsecurity.com/2025/11/meet-rey-the-admin-of-scattered-lapsus-hunters/ #USCentersforDiseaseControlandPrevention #ScatteredLAPSUS$Hunters #cybero5tdev@proton.me #Ne'er-Do-WellNews #SchneiderElectric #Cyb3rDrag0nzTeam #ALittleSunshine #SaifAlDinKhader #ScatteredSpider #OrangeRomania #BreachForums #ShinyHunters #Breadcrumbs #CrowdStrike #Disney/Hulu #SentinelOne #ShinySp1d3r #Ransomware #Flashpoint #Hikki-Chan #Telefonica #ZaidKhader