Addy.io: Anonymous Email Forwarding. Protect your real email address using email aliases. GitHub: Everyone should be using some sort of burner email address when using different services. It's also very cheap! There is other choices out there such as SimpleLogin / Proton. Do your own due diligence. image
‼️Shinyhunte[.]rs is back online with "Doomsday The Story of James". At the end you accept and download BreachForums database. I reviewed the data and it is legit. Why? My user ID leading to a fake email address shows. If you ever registered on BF... GGs. Use alts! 😂
❗️Akira Ransomware claims 5 victims 🇨🇦 Triple Eight Transport 🇺🇸 Swavelle Group 🇺🇸 Wearbest Sil-Tex Mills 🇺🇸 McCraw Oil 🇺🇸 Lone Rock Timber
ProxyBridge: Redirect any Windows/MacOS TCP and UDP traffic to HTTP/Socks5 proxy GitHub: Website:
🚨 Threat actor selling first-hand hospital medical records data from China 📌 China 🇨🇳 ▪️Type: Medical Records ▪️Threat Actor: takingOver ▪️Data Size: 160,000 total entries (≈100,000 after duplicate filtering) ▪️Timeframe: Up to 2025 (recent) Alleged data includes: ▪️Professional addresses ▪️Medical conditions ▪️Family contact information ▪️Other sensitive health-related details image
🚨 Threat actor provides full source code for “Xverginia 4.1”, an advanced phishing kit 📌 Global ▪️ Type: Phishing Kit / Source Code ▪️ Name: Xverginia 4.1 ▪️ Threat Actor: Spear ▪️ Purpose: Credential harvesting, IP geolocation, analytics dashboard Features: ▪️Advanced analytics ▪️Phishlet-based templates ▪️Login validity stats ▪️Visit tracking by country / phishlet
❗️Threat actor selling multiple exploits found on a Romanian VPS (includes N8N auto-exploit tool) 📌 Romania 🇷🇴 ▪️ Type: Exploit ▪️ Threat Actor: melbond135 ▪️ PoC: Yes (scanner performs automatic exploitation) Price: $50 per exploit image
Elite subscribers now have access to a early look at the new Threat Feed that is still a couple of weeks away. Be patient with loading times.
❗️Spanish and German authorities, supported by Europol, have carried out a major operation against the international criminal organization Black Axe, resulting in 34 arrests and significant disruption to the group’s activities. Most arrests occurred in Seville, with additional arrests in Madrid, Málaga and Barcelona. Black Axe, a hierarchical organization originating in Nigeria, is involved in cyber-enabled fraud, drug and human trafficking, prostitution, kidnapping, armed robbery and ritualistic practices. Authorities estimate the network caused over EUR 5.93 million in fraud-related damages, and during house searches they seized EUR 66 403 in cash and froze more than EUR 119 000 in bank accounts. The operation targeted the group’s core members, including 10 individuals of Nigerian nationality, and uncovered a system in which Black Axe recruits vulnerable money mules in economically deprived Spanish communities. Europol provided analytical support, intelligence sharing, and on-site coordination, helping map the group’s extensive transnational network. With around 30,000 registered members operating across roughly 95 global zones, Black Axe’s decentralized structure enables billions in yearly criminal proceeds through numerous small-scale offences. This coordinated action aims to weaken the organization's cross-border operations and limit its ability to exploit victims.