Ad End 1 February 2024
Ad Ends 13 January 2025
ad End 25 April 2025
Ad Ends 20 January 2025
Ad expire at 5 August 2024
banner Expire 25 April 2025
What's new
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
adv exp at 23 August 2024
casino
swipe store
Carding.pw carding forum
BidenCash Shop
Kfc CLub

Search results

  1. File_closed07

    Hacker stole more than 8.2 thousand databases from the security company Night Lion Security

    Databases contained information on billions of users that leaked as a result of hacks by other companies. A cybercriminal using the pseudonym NightLion, reported hacking the internal servers of the American information security company Night Lion Security. The hacker allegedly stole...
  2. File_closed07

    Hacker put up for sale database with 2 million Citrix customer records

    The price of a database called citrix_leads_vivo is 2.15 bitcoin. A hacker posted an ad on a clandestine darknet forum selling a database allegedly owned by Citrix, an American software maker. According to the seller, he gained access to more than 2 million records of the company's customers...
  3. File_closed07

    The Ministry of Internal Affairs and Group-IB detained fraudsters who stole money from VIP-clients

    To collect information about the victim, crooks used special “breakout” services in telegram channels or on underground hacker forums. Employees of the Moscow criminal investigation department, with the assistance of Group-IB experts, detained the organizers of a criminal group specializing...
  4. File_closed07

    Tech giants accused of illegally using photos for face recognition systems

    Amazon, Alphabet, and Microsoft have sued Illinois. Two Illinois residents Steven Vance and Tim Janecyk have sued Amazon, Alphabet (Google’s parent company) and Microsoft for using people photos to train their face recognition technologies without permission and for violating biometric laws...
  5. File_closed07

    Google sued for monitoring user activity

    Even if you disable the activity tracking function in the web and applications in the settings, Google still monitors activity. Google captures user interactions with applications, even if they set their recommended settings, which should block this possibility. This was reported in a...
  6. File_closed07

    Two Chinese citizens accused of hacking into computers of a dozen American companies

    hackers carried out their activities for ten years not only in the United States, but also in other countries of the world. The US Department of Justice has accused two Chinese citizens of collaborating with Chinese intelligence agencies to hack into the computers of a dozen American...
  7. File_closed07

    FBI used data from travel agencies to track down

    The FBI asked Saber to monitor in real time suspected cybercriminals. The Federal Bureau of Investigation used information obtained from the Saber travel agency to conduct surveillance. As reported by Forbes, employees of the department asked the company to "actively spy" on individuals...
  8. File_closed07

    Three carders detained in St. Petersburg

    Attackers "cloned" well-known online stores and stole customers' bank data. Employees of the department for combating crimes in the field of computer technology of the Main Directorate of the Ministry of Internal Affairs of Russia in St. Petersburg and the Leningrad Region detained three...
  9. File_closed07

    Russians Will Not Be Able To Replenish Anonymous E-wallets With Cash

    An unidentified individual must use a bank account to provide money to the wallet operator. In connection with the entry into force of amendments to the law "On the National Payment System", the authorities of the Russian Federation are introducing a restriction prohibiting citizens from...
  10. File_closed07

    Cybercriminals have stolen Zello user credentials

    As a precaution, user passwords have been reset, and the next time you log in, you will need to set new ones. The American manufacturer of Internet radio Zello reported the leakage of data of its users, in particular their email addresses and password hashes. Zello is a mobile service with...
  11. File_closed07

    The teenager who hacked Twitter turned out to be a hardened cybercriminal

    Graham Ivan Clarke began planning the Twitter hack just two weeks after he got caught stealing 100 bitcoins. The 17-year-old native of Tampa, Florida, USA, who was arrested last week, Graham Ivan Clark, who, according to the American authorities, organized the Twitter hack , had previously...
  12. File_closed07

    Resident of Brest arrested, accused of hacking 150 thousand social network accounts

    If there was no money, then he was engaged in cheating likes and votes, after which he tried to sell the account at a higher price. A resident of Brest, who was charged with committing hacker attacks on user accounts in various countries of the world, will appear in court on Thursday, law...
  13. File_closed07

    Hackers in Chelyabinsk stole gasoline from a gas station for 10 million rubles

    They were sentenced to conditional imprisonment for a term of 2 to 4 years with probation periods of 4 to 5 years. In the Traktorozavodsky District Court, 17 employees - two IT specialists and 15 gas station cashier operators - were found guilty of committing a crime under Art. 159 of the...
  14. File_closed07

    Hackers try to steal materiel from Canadian citizens amid COVID-19 pandemic

    Cybercriminals have hacked Canadians' accounts in the system that provides access to public service portals. A Canadian government website that provides access to immigration, retirement and tax services has been hacked by cybercriminals to steal government funds to help citizens amid the...
  15. File_closed07

    Hackers stole data from Chinese social media monitoring firms

    The hackers sent presentations, Word documents and 40 GB of files to journalists, which allegedly belong to three companies. The hacker group CCP Unmasked reported hacking into three Chinese companies that monitor and supervise social media. Writes about this edition of Motherboard. The...
  16. File_closed07

    A group of hackers who used viruses to steal personal data exposed in the Lviv region

    The cybercriminals placed the stolen information in one of the messengers In the Lviv region, employees of the Security Service of Ukraine exposed a hacker group that was engaged in theft of personal data using viruses. This was reported by the press service of the regional department of the...
Ad End 1 February 2024
Top