❗️🇹🇷 Alleged Leak of 109 Million Turkish Citizen Records Containing National Identity Data
❗️Alleged Data Sale of 1.39 Million Douglas Cosmetics Customer Records
❗️Alleged Data Breach of French Home Healthcare Provider SOS Oxygène Exposing 149,000 Patient Records
❗️Alleged Data Breach of Israeli IT Services Company Infocenters Ltd Exposing 200,000 User and Employee Records
❗️Threat actor allegedly leaking 830K-record dataset tied to Japanese business directories 📌 Japan 🇯🇵 ▪️Target: emachi.co.jp ▪️Type: Data Leak ▪️Threat Actor: Solonik ▪️Records: 830,000+ ▪️Format: SQL dump (~1.1GB) ▪️Samples: Yes Data reportedly includes: ▪️Full names (Kanji + Furigana) ▪️Mobile + landline phone numbers ▪️Personal & business emails ▪️Addresses with ZIP codes & prefectures ▪️Business names, types, descriptions ▪️GPS coordinates (lat/lon) ▪️Image folder paths & internal shop IDs image
‼️🇯🇵 Nissan Motor Corporation has been claimed a victim to Everest Ransomware image
‼️17.5 Million Instagram Accounts Exposed in Major API Data Leak Meta is facing a significant security incident after cybersecurity firm Malwarebytes confirmed a breach impacting 17.5 million Instagram users. The leaked dataset, which includes usernames, email addresses, phone numbers, and partial physical addresses, is now being actively circulated on dark web forums. In the aftermath, millions of Instagram users have reported receiving unexpected password reset emails from the platform’s legitimate domain: security@mail[.]instagram[.]com. Although the emails are authentic, they were not requested by recipients, fueling widespread confusion over whether Instagram is experiencing a glitch or if users are being targeted in phishing attempts. Security researchers now believe these unsolicited reset emails are directly linked to the breach, suggesting threat actors may be using the exposed data to initiate account recovery flows or to obscure targeted phishing activity. The dataset is believed to have been obtained by a hacker known as “Solonik”, with the underlying issue reportedly tied to an API-related exposure dating back to 2024 (see screenshot 2). As of now, Meta has not issued an official statement regarding the incident. Sources:
💡I am going to start publishing more free articles on the website in the coming days. You can see a sample with any of the below. Same kind of format as you see on X, but nicer and easier to read and currently Tor friendly with no JS in the posts. Paywalled articles will still look and feel like they currently do, including the public preview.
‼️Respawn Entertainment, makers of the popular Apex Legends, has just announced it is having an active security incident "where a bad action is able to control the inputs of another player remotely in @PlayApex." image
❗️Threat actor allegedly auctioning admin + shell access to a US-based WordPress shop 📌 United States 🇺🇸 ▪️Target: Unnamed US WordPress e-commerce shop ▪️Type: Admin Access Sale ▪️Threat Actor: Shopify ▪️Access Level: Admin panel + Shell Orders: 97,177 total ▪️December: 817 ▪️November: 703 ▪️October: 721 ▪️Payment Method: 100% card ▪️Form Type: iframe Auction: ▪️Start: $1,000 ▪️Step: $100 ▪️Blitz: $3,000