@justabreach Avatar @justabreach JustaBreach

JustaBreach posts on X about une, avec, qui, france the most. They currently have [-----] followers and [---] posts still getting attention that total [-------] engagements in the last [--] hours.

Engagements: [-------] #

Engagements Line Chart

Mentions: [--] #

Mentions Line Chart

Followers: [-----] #

Followers Line Chart

CreatorRank: [-------] #

CreatorRank Line Chart

Social Influence

Social category influence technology brands countries stocks finance social networks fashion brands automotive brands gaming products celebrities

Social topic influence une, avec #4657, qui #851, france, palantir #32, cest, systems, bank, du, hack #304

Top accounts mentioned or mentioned by @cnil @seblatombe @kimdotcom @darkwebinformer @palantirtech @cnrs @falconfeedsio @ransomdb @assembleenationalefr @hishcok @cedhaurus @brk4k @sirafuera @beacon @merceradvisors @blackcattyp @jaeger_program @ifredparis @ovh_support_fr @ced_haurus

Top assets mentioned Bumble Inc. (BMBL) Alphabet Inc Class A (GOOGL) Coinbase Global Inc. (COIN)

Top Social Posts

Top posts by engagements in the last [--] hours

"🚨 BREAKING: Cyber Warfare Escalates in US-Venezuela Conflict🚨 As the US military operation unfolds in Venezuela on January [--] [----] with the capture of Nicols Maduro amid airstrikes on Caracas a major cyber dimension is emerging. Reports highlight significant cyberattacks: In December [----] PDVSA (Venezuela's state oil company) suffered massive disruptions including blackouts in refineries and halted operations officially blamed on US-linked forces. Today widespread internet outages power failures and electronic warfare tactics have jammed communications disrupting defenses and creating"
X Link 2026-01-03T12:48Z [--] followers, [---] engagements

"πŸ’»Is AI the ultimate weapon for cybercriminals 😱πŸ”₯ Picture this: deepfakes perfectly mimicking your CEO to steal company secrets πŸ‘”πŸŽ₯ hyper-personalized phishing crafted in seconds πŸ“§βš‘ or fully autonomous ransomware that spreads analyzes data and negotiates ransoms on its own πŸ’»πŸ’° Experts warn: - Cybercrime will become fully industrialized & automated with AI agents running entire attacks from recon to extortion πŸ€–πŸ•΅ (Trend Micro) - Major IP leaks via "shadow AI" (unapproved tools) as autonomous AI explodes in enterprises πŸ•³πŸš€ (IBM) Drop your worst AI-cyber nightmare scenarios in the"
X Link 2026-01-04T12:49Z [--] followers, [--] engagements

"🚨 Major Data Breach Alert: Endesa Spain Database Leak 🚨 A hacker claims to have breached Endesa Spain's leading electricity & gas provider exposing data on over [--] million individuals πŸ” Types of Leaked Data: - Personal Identifiers : Full names birthdates national IDs (NIF/CIF/NIE) nationalities and document types. - Contact Details πŸ“ž: Emails phone numbers (mobile home work) fax numbers. - Addresses 🏠: Billing/shipping streets cities postal codes countries. - Financial Info πŸ’³: IBAN bank accounts debt records credit expiration flags unpaid risks. - Utility Records ⚑: CUPS supply point"
X Link 2026-01-05T04:43Z [--] followers, [---] engagements

"🚨 Fujifilm Data Breach Alert: In [----] approximately 220k customer records were exposed by Scattered LAPSUS$ Hunter (SLSH). Here's a breakdown of the leaked data and potential risks. ⚠ Types of Data Exposed: - πŸ“› Personal Identifiers: Full names account IDs. - πŸ“ Addresses: Detailed billing & shipping info (streets cities postal codes countries mostly Indonesia). - πŸ“ž Contact Details: Phone numbers some fax numbers. - πŸ“… Metadata: Creation/modification dates owner IDs custom fields like customer codes & satisfaction indicators. Potential Risks: - Identity Theft: Criminals could use"
X Link 2026-01-06T13:43Z [---] followers, [--] engagements

"🚨 Breaking: Logitech Hit by Massive Data Breach in Nov [----] 🚨 Cl0p ransomware gang exploited a zero-day in Oracle E-Business Suite (CVE-2025-61882) to exfiltrate [---] TB of data from Logitech's internal systems. Not a full hack but third-party vuln exposed ops data. Logitech confirms: no credit cards or national IDs compromised. πŸ“‚ Types of Data Harvested: - Employee & consumer PII: Names emails addresses πŸ‘€πŸ“§πŸ  - Internal business documents: Contracts strategies reports πŸ“„πŸ’Ό - Supplier & partner files: Vendor info agreements πŸ€πŸ”— ⚠ Associated Risks: - Identity theft & fraud: Scammers could"
X Link 2026-01-07T10:47Z [---] followers, [---] engagements

"🌍Iran is now in a NATIONWIDE INTERNET BLACKOUT amid massive protests against the regime πŸ”₯ NetBlocks confirms: Connectivity collapsed across the country to hide the repression. πŸ“‰ Proof πŸ‘‡ (official NetBlocks post Jan [--] 2026): The Iranian people are fighting for freedom don't let them be silenced in the dark πŸŒπŸ‘Š #IranProtests #IranRevolution2026 #StandWithIran #FreedomForIran #InternetBlackoutIran" ( https://x.com/netblocks/status/2009313506726957230 https://x.com/netblocks/status/2009313506726957230 ⚠ Confirmed: Live metrics show #Iran is now in the midst of a nationwide internet blackout;"
X Link 2026-01-08T20:04Z [--] followers, [---] engagements

"🚨 Breaking: Chinese-linked hackers are exploiting VMware ESXi zero-days to break out of virtual machines and seize control of hypervisors 😱 In a recent attack spotted by Huntress in December [----] threat actors used three critical flaws (CVE-2025-22224 CVE-2025-22225 CVE-2025-22226) to leak memory corrupt it and execute code as the VMX process. πŸ›‘ They gained initial access via a hacked SonicWall VPN then deployed a sophisticated toolkit including exploit.exe (MAESTRO) a custom kernel driver and a stealthy VSOCKpuppet backdoor on port [-----] for persistence and command execution. πŸ”’ This"
X Link 2026-01-09T19:13Z [--] followers, [---] engagements

"🚨 ⚠ BREAKING: Massive Instagram Data Breach Exposes [----] Million Users⚠ Hey everyone a huge security alert just dropped Instagram has suffered a data breach affecting around [----] million accounts. This isn't your typical scrape; hackers got hold of sensitive non-public info. Let's break it down step by step. 🧡 πŸ” What Happened Security researchers uncovered a leaked dataset in early January [----] containing usernames email addresses phone numbers physical mailing addresses and account metadata. No passwords were exposed but threat actors are already exploiting it users are getting legit"
X Link 2026-01-10T09:27Z [---] followers, [---] engagements

"🚨 Everest ransomware publicly claims Nissan Motor Corporation as a new victim on their dark web leak site TODAY Fresh listings spotted by @DarkWebInformer @FalconFeedsio & @Ransom_DB Total amount of data: 900GB Txt: [--] [---] Csv: [--] [---] Zip: [--] [---] Xls: [--] [---] Nissan already hit hard in [----] (Qilin on design subsidiary + Red Hat customer data leak). Is this round [--] 😱 No official Nissan response so far #Ransomware #Cybersecurity #Nissan #EverestRansomware #DataBreach #Breaking (Character count: [---] plenty of room for one of the leak site screenshot images from the intel posts if you want to"
X Link 2026-01-10T17:52Z [---] followers, [---] engagements

"🚨 Pro-Russian group NoName057(16) publicly claims attacks on Polish infrastructure TODAY (Jan [--] 2026) In retaliation for Poland's support to Ukraine (including relocation of drone/missile production facilities as confirmed by FM Radosaw Sikorski) this hacktivist collective is bragging about DDoS attacks + unauthorized access to industrial systems Claimed DDoS targets with their check-host links: ❌ Zgierz County (d Voivodeship) ❌ City of Zgierz ❌ Maopolska Voivodeship ❌ Krakow Powiat (Maopolska) ❌ City of Krakow ❌ Nowy Scz County (geo-blocked) ❌ City of Nowy Scz ❌ Tarnw County Office ❌ PKN"
X Link 2026-01-12T11:30Z [---] followers, [---] engagements

"Great question Data breaches like the Under Armour one are tough to prevent entirely (that's on the companies) but you can protect yourself from the fallout. Here's how to 'avoid' or minimize risks: Use unique passwords everywhere πŸ”‘: Don't reuse them. Get a password manager like Bitwarden or LastPass to generate strong ones. Enable 2FA (Two-Factor Authentication) Monitor your data : Sign up for breach alerts on sites like Check your credit reports regularlπŸ‘€ Be phishing-proof : Never click links in unsolicited emails. Verify directly on the official site. With purchase history leaked"
X Link 2026-01-21T16:42Z [---] followers, [--] engagements

"Interesting about that Life360 message Could you tell me more Was it a security alert notifying you that your email/phone showed up in the Under Armour breach or something different If youre cool with it shoot me the details or a screenshot in DMs Super curious how they phrased it. Appreciate it https://twitter.com/i/web/status/2014016680280605007 https://twitter.com/i/web/status/2014016680280605007"
X Link 2026-01-21T16:46Z [---] followers, [---] engagements

"🚨 Clawdbot is hemorrhaging ➑1000 instances exposed zero auth root shell + API keys leaking everywhere. Shodan/Censys scans show 9001009+ gateways on port [-----] wide open. Misconfigs (trustedProxies spoofing localhost bypass via reverse proxy) + default no-auth = instant pwn. Attackers get: - Anthropic/OpenAI keys - Private chats + attachments - Shell exec (often root in containers) - Signal pairing hijack Sources: - SOCRadar: [----] exposed gateways - Cybersecurity News: Hundreds leaking creds/chats - 1000+ AI agents exposed - X threads: Jamieson O'Reilly findings + real brute-force attacks"
X Link 2026-01-26T19:33Z [----] followers, [---] engagements

"🚨 Derbez nouvelle victime de Qilin ransomware Victime : Derbez ppinire & paysagiste familial bas Gassin (Golfe de Saint-Tropez) depuis [----]. Spcialis dans les plantes ornementales exceptionnelles cration/maintenance de jardins terrassement traitements phytosanitaires co-responsables. Clientle haut de gamme (rgion luxe). Date de claim : 12/02/2026 Donnes exfiltres confirmes par le groupe double extorsion classique (chiffrement + menace de publication). Pas de samples volume ou dtails prcis publis pour l'instant. Site toujours up aucune communication officielle ni mention d'incident visible au"
X Link 2026-02-12T12:32Z [----] followers, [---] engagements

"🚨DATA BREACH Under Armour (underarmour.com) In November [----] the Everest ransomware group claimed responsibility for a massive cyberattack on Under Armour exfiltrating [---] GB of sensitive data. After Under Armour reportedly failed to pay the ransom within the 7-day deadline the attackers leaked the data on their dark web site. 😱 Scale of the alleged leak (per underground forums Jan 2026): - [----] million unique customer records +emails) - 191+ million total records across multiple exports - Decompressed files: [----] GB Compromised data types include: - Full names + gender πŸ‘€ - Email addresses"
X Link 2026-01-18T17:03Z [----] followers, 22.9K engagements

"⚠ Une attaque ransomware de [----] refait surface chez Ingram Micro (un gant de la distribution IT mondiale) depuis ces dernires 24h. L'attaque date de juillet [----] mais les notifications officielles arrivent maintenant en [----]. Chronologie dtaille pour tout comprendre : - Dbut Juillet [----] (Autour du 2-3 Juillet Week-End du [--] Juillet US) : Ingram dtecte du ransomware sur ses systmes internes. Le groupe SafePay (probablement un rebrand de LockBit ou similaire super actif en 2025) revendique l'attaque. Ils annoncent avoir exfiltr [--] To de donnes et fixent une deadline pour la ranon (vers le 1er"
X Link 2026-01-19T13:59Z [----] followers, [---] engagements

"🚨 Major Breach Alert: Massive Leak at Luxshare Precision Industry Confidential Apple docs (iPhone AirPods Apple Watch Vision Pro) plus stuff from Nvidia Tesla and others stolen via ransomware by RansomHouse. We're talking 3D CAD models electronic schematics engineering docs supply chain processes. Background: Luxshare a key Apple supplier based in China (278000 employees) got hit by a ransomware attack in mid-December [----]. RansomHouse (also known as RansomHub) encrypted systems and stole sensitive data. Luxshare is investigating but the group is threatening to fully leak everything if no"
X Link 2026-01-21T12:22Z [----] followers, [----] engagements

"🚨 Fuite chez VALORISSIMO (filiale Bouygues Immobilier) Thread post aujourdhui (22/01/2026) sur BreachForums [--] [---] enregistrements [----] (revendus/maintenant leaks ) πŸ“Š Donnes exposes : [--] [---] comptes CGP / conseillers patrimoine noms prnoms emails mobiles & fixes adresses postales compltes [--] [---] socits (raisons sociales SIRET TVA intracom adresses) [--] [---] contacts pros (mmes coordonnes + companyId) Les chantillons montrent des vrais profils : conseillers Caisse dpargne Adomos cabinets indpendants + notes internes sur mandats/renouvellements. Risques majeurs : Phishing ultra-cibl sur wealth"
X Link 2026-01-22T12:26Z [----] followers, [----] engagements

"🚨 LAPSUS-GROUP drops 4TB claim on (Montreal SaaS for retail clienteling/AI powers Macy's Saks Fabletics Chico's GNC Bloomingdales Puma etc). Full dump: source code dev data logs user images SQL dumps PII. .tar.gz (1TB compressed 4TB raw). - internal_data/ (719GB): [--] tar.gz files (sf-platform-logs sf-userimage sf-dev-tests-private salesfloor-deployment acentera-core-prod-assets etc.) - salesfloor_index.tar.gz (tree samples) - sample.json (record previews) - userpii.tar.gz [--------] PII records (names emails phones CRM IDs subs flags) Affected brands listed: allenedmonds arhaus belk benbridge"
X Link 2026-01-22T17:39Z [----] followers, [----] engagements

"🚨 ShinyHunters just dropped a dark web leak site claiming massive breaches - Betterment (fintech/robo-advisor): 20M+ PII records leaked (names emails addresses phones) [---] GB compressed - Crunchbase: 2M+ records [---] GB - SoundCloud: 30M+ records [---] GB All updated Jan [--] [----]. Group ties it to recent Okta vishing campaign after failed extortion. More victims teased. #DataBreach #ShinyHunters #CyberSecurity #Betterment https://twitter.com/i/web/status/2014751214613753916 https://twitter.com/i/web/status/2014751214613753916"
X Link 2026-01-23T17:24Z [----] followers, [----] engagements

"🚨 NIKE DATA BREACH: WorldLeaks has executed. [---] TB / [------] files allegedly exfiltrated from Nike's internal systems are now leaking online. This isn't just another ransomware claim it's a full-on data dump hitting the core of one of the world's biggest sportswear brands. What we know so far (as of Jan [--] [----] evening CET): WorldLeaks (Hunters Int'l successor / data extortion focused) added Nike to their leak site earlier this week. Countdown expired (around Jan [--] 6pm GMT / earlier reports). Dump now live: Massive structured access to Windows servers deep compromise of operational &"
X Link 2026-01-24T22:21Z [----] followers, [----] engagements

"🚨 Fuite Base Livrenpoche (FR marketplace livres d'occasion) mise en vente 716k clients Breach revendique: 24/01/2026 Donnes compromises: πŸ“‹ Noms/prnoms partiels (+socits) πŸ“§ Emails (198k uniques) πŸ“± Tlphones (449k uniques) πŸ“ Adresses postales (adresse1/2 CP ville dept pays partiellement masques sur 692k lignes) OrderID Stats: [---] [---] lignes Aucune confirmation publique (site OK pas d'alertes HIBP/mdias/CNIL) Risques majeurs: 🎣 Phishing cibl (mail/SMS) πŸ•΅ Usurpation d'identit / spam πŸ“§ Revente bases marketing noir βš– RGPD violation (France) Notif obligatoire @CNIL si rel #DataBreach"
X Link 2026-01-25T13:01Z [----] followers, [----] engagements

"🚨 Alleged live insider access to FedEx database being advertised on a cybercrime forum. (Unverified yet) Claims include: - Real-time shipment search by sender (even newly created labels) - Full recipient & shipper details (addresses account numbers etc.) - Sorting by city/state weight delivery attributes - Seller open to collaborating on "intercepting/holding" packages Posted [--] hours ago by user "Hackaton13". Screenshot shared by @DarkWebInformer. This is NOT verified. No confirmation from FedEx no independent corroboration yet. Could be legit insider access exaggeration or outright"
X Link 2026-01-25T17:14Z [----] followers, [----] engagements

"🚨 Techni-Contact.com (B2B pro FR) Dump massif en vente sur un forum Date : 27/01/2026 Volume : 1.06M clients (dont 879k avec login + pass MD5) 5.88M lignes contacts / demandes de devis Donnes exposes : πŸ“‹ Noms prnoms fonctions (chef travaux directeur etc.) πŸ“§ Emails pro/perso (beaucoup .fr acadmiques collectivits) ☎ Tlphones & fax 🏠 Adresses compltes (entreprises coles lyces) SIRET tailles entreprise secteurs NAF πŸ“„ Demandes de devis dtailles (produits commentaires dates) Quelques IP / GCLID (tracking Ads) Risques majeurs ⚠ 🎣 Phishing ultra-cibl (faux devis fournisseurs spam massif) πŸ•΅"
X Link 2026-01-27T07:44Z [----] followers, [----] engagements

"🚨 ICE Agents Leak Forum Dump Circulating (Jan 2026) Breached forum thread: "ICELIST - [----] Agents [---] Photos" Volume: [----] ICE agents listed [---] with associated photographs Alleged data: πŸ“‹ Names roles PII details (tied to DHS/ICE breach) πŸ–Ό Photos (frontline officers + support staff) Context & Latest Developments: - Linked to Jan [----] whistleblower leak to "ICE List" site (run by non-US individual) exposing [----] ICE/Border Patrol/DHS personnel (2k frontline + 2.5k support) after fatal Minneapolis ICE shooting of Rene Good (sparked protests). DHS insider allegedly provided the bulk. - DHS"
X Link 2026-01-27T08:05Z [----] followers, 96.5K engagements

"🚨 NEW RANSOMWARE CLAIM: Genesis Hits IMA Diligence Services (Division of IMA Financial Group) Fresh leak site entry today (Jan [--] 2026) on Genesis' .onion page Victim profile: - IMA Diligence Services (ex-RedRidge Diligence) specialized in financial due diligence Quality of Earnings (QoE) lender field exams M&A advisory insurance DD - Part of IMA Financial Group ( $1B revenue employee-owned insurance/risk/wealth mgmt giant). - Revenue (division): $10M. - Clients: Private Equity firms lenders corporates family offices attorneys. Status: - Added: Jan [--] [----] (hours ago). - Countdown active: 3"
X Link 2026-01-27T13:32Z [----] followers, [---] engagements

"🚨 Match Group (MTCH) : Alleged Massive US Dating Empire Breach (28/01/2026) by ShinyHunters Victim: Match Group Inc. NASDAQ:MTCH US-based tech giant headquartered in Dallas Texas Owns the world's largest portfolio of dating apps: Tinder (main revenue driver) Hinge Match . com OkCupid Plenty of Fish OurTime + others [--------] employees TTM revenue $3.463.48 Billion USD Dominates US/online dating market (45% share in some segments) Publicly traded since [----] spun from IAC ShinyHunters / cysc claims +10M records stolen via Appsflyer analytics + hundreds of internal docs. Volume: [---] GB"
X Link 2026-01-28T09:03Z [----] followers, [----] engagements

"🚨 Massive vishing/phishing campaign by ShinyHunters & SLSH: Targeting +100 companies via Okta SSO Real-time MFA bypass through fraudulent calls How it works The attackers (SLSH alliance: Scattered Spider + LAPSUS$-style + ShinyHunters) call employees pretending to be internal IT support. "Suspicious activity on your account click this link to verify / reset MFA" During the live call they guide to an ultra-realistic phishing site (AiTM = Adversary-in-the-Middle) that proxies the session: creds + MFA (push/OTP) + session tokens stolen in real time. Persistent access without alerts Targets &"
X Link 2026-01-28T12:26Z [----] followers, [---] engagements

"🚨 BREAKING: ShinyHunters just dropped a BOMBSHELL claim on Bumble Inc Thousands of restricted/confidential internal documents exfiltrated mainly from Google Drive & Slack channels. 30GB compressed dump updated Jan [--] [----]. This comes right after their massive hits on Match Group (Tinder/Hinge/OkCupid/POF 10M+ records + 1.7GB internals leaked Jan 27). Dating giants getting shredded: employee HR files strategy docs Slack convos maybe more No official word from Bumble yet but if legit huge privacy & corporate exposure risk. #DataBreach #ShinyHunters #Bumble #CyberSec #Hacking #DarkWeb"
X Link 2026-01-28T19:39Z [----] followers, [----] engagements

"🚨 ALERTE MAJEURE : ShinyHunters revendique un norme leak sur Bumble Inc Certaines personnes vont-elles devoir dormir sur le canap d'ici peu πŸ˜ΆπŸŒ«πŸ‘€ 🚨 BREAKING: ShinyHunters just dropped a BOMBSHELL claim on Bumble Inc Thousands of restricted/confidential internal documents exfiltrated mainly from Google Drive & Slack channels. 30GB compressed dump updated Jan [--] [----]. This comes right after their massive hits on https://t.co/weivT8HC2D 🚨 BREAKING: ShinyHunters just dropped a BOMBSHELL claim on Bumble Inc Thousands of restricted/confidential internal documents exfiltrated mainly from Google"
X Link 2026-01-28T19:41Z [----] followers, [----] engagements

"Nicotine seems to want to have a little fun on BreachForums πŸ€” #umbra #breachforums"
X Link 2026-01-29T19:55Z [----] followers, [----] engagements

"🚨 RANSOMWARE ALERT: 0APT is on a massive rampage 19+ victims announced in just a few hours/days extremely high volume and very sensitive data at risk. Stay alert the threat level is rising fast Here are the victims hit today: - 🌽 Emerald Agriculture: GMO patents fertilizer recipes banned pesticide logs - πŸ”’ IronClad Security: Client lists access codes bank vulnerability assessments - πŸ“ž Zenith Telecom: Call logs SMS archives government surveillance requests - πŸ“° Global News Corp: Source identities unredacted interviews propaganda deals - πŸ’Ž Sapphire Jewelry: Diamond certificates buyer"
X Link 2026-01-30T08:23Z [----] followers, [----] engagements

"🚨 Major blow to ransomware ecosystem: The FBI has seized RAMP (Russian Anonymous Marketplace) a notorious dark web forum that openly allowed ransomware ads malware-as-a-service & initial access brokers. Clearnet (ramp4u) & Tor sites now show FBI seizure banner (Jan [--] 2026) coordinated with US DoJ & Southern District of Florida. Threat actors already migrating elsewhere. Sources: - ZeroFox: - The Record: - BleepingComputer: - Ars Technica: #Cybersecurity #Ransomware #FBI #DarkWeb https://arstechnica.com/security/2026/01/site-catering-to-online-criminals-has-been-seized-by-the-fbi/"
X Link 2026-01-30T14:34Z [----] followers, [---] engagements

"🚨 Breaking: Ransomware group #0APT just dumped a MASSIVE [--] victims on their leak site in ONE DAY (Jan [--] 2026) From hospitals to banks energy grids and even AI firms insane volume for a crew that popped up just this month. But hold up. No actual data leaks or proofs posted yet despite "terminated" countdowns. Is this a legit threat or a bluff/scam to hype their RaaS Skeptical AF given their newbie status. Eyes on this πŸ‘€ #CyberSecurity #Ransomware #needaproof 🚨 RANSOMWARE ALERT: 0APT is on a massive rampage 19+ victims announced in just a few hours/days extremely high volume and very"
X Link 2026-01-30T17:03Z [----] followers, [----] engagements

"🚨 Parler allegedly BREACHED in Jan [----] [----] MILLION user records up for sale on underground forums ($5K in XMR/BTC). Full DB dump (not the [----] scrape): emails hashed passwords phone numbers IPs bios locations Stripe hints + leaked prod env variables (Recaptcha keys Firebase DigitalOcean creds exposed). Sample shows accounts from [--------] Seller claims exclusive sale post will vanish once sold #DataBreach #Parler #CyberSecurity https://twitter.com/i/web/status/2017349000064544986 https://twitter.com/i/web/status/2017349000064544986"
X Link 2026-01-30T21:27Z [----] followers, [----] engagements

"πŸ”΄DOJ just dropped this wild Epstein file (EFTA01660651.pdf) today and wow its a lot. Trumps accused of raping a 13-year-old named like 80+ times auctions at Mar-a-Lago island parties the whole circus. A little light reading never hurt anyone right 😏 Grab it while its hot and enjoy the popcorn show. πŸ“–πŸ”₯ Link: #EpsteinFiles #Transparency #Trump #DOJ https://www.justice.gov/epstein/files/DataSet%2010/EFTA01660651.pdf https://www.justice.gov/epstein/files/DataSet%2010/EFTA01660651.pdf"
X Link 2026-01-30T23:17Z [----] followers, [----] engagements

"If youve got some free time on your hands: Good luck getting through it all Turns out Jeffrey Epstein was apparently a big karaoke fan πŸ€¦β™‚ #EpsteinFiles #DOJ https://www.justice.gov/epstein https://www.justice.gov/epstein"
X Link 2026-01-31T10:11Z [----] followers, 28.4K engagements

"🚨 FluidOne (secure cloud & connectivity provider) just got hit by WorldLeaks ransomware group. Listed on their .onion site Jan [--] [----] Client docs from workspace allegedly stolen (891.3 GB [-------] files) They serve big names like: 🍩 Krispy Kreme (SD-WAN magic) πŸ“± O2 (nationwide free Wi-Fi project) 🏫 University of Surrey 🏦 Metro Bank πŸ” Princes (SAP/AWS migration) And 2000+ businesses total. Irony level: they're a cyber security specialist themselves. πŸ€¦β™‚ #CyberSecurity #Ransomware #DataBreach #FluidOne https://twitter.com/i/web/status/2017949953704730897"
X Link 2026-02-01T13:15Z [----] followers, [----] engagements

"🚨 Breach Alert SEKISUI Aerospace Corporation (USA) ITAR-controlled data for sale on BreachForums Announcement date: February [--] [----] Claimed package: [--] GB of export-controlled data Asking price: $200000 USD Real breach context A data theft from SEKISUI Aerospace (U.S. subsidiary of Japans SEKISUI Chemical) was reported late [----]. Initial reported volume from multiple threat intel sources: [--] GB Classification: EXPORT CONTROLLED EAR 9E991 / ITAR Technical Data Strict prohibition on export outside the U.S. without a BIS/DDTC license Content described in the listing - High-resolution PDF"
X Link 2026-02-03T19:54Z [----] followers, [---] engagements

"🚨Nouvelle fuite: Loxam (leader location matriel) victime dune exfiltration massive 94k tournes 828k points darrt [--] Go extraits. Donnes : chauffeurs plaques adresses (dont potentiellement des sites sensibles). Clients impacts : SNCF EDF Renault Assemble nationale surveiller de prs (@CNIL ) #Cybersecurity #Breach #Loxam La fuite de donnes de Loxam a expos des informations concernant des livraisons de colis destins plusieurs grandes organisations dont lAssemble nationale la SNCF Carrefour TotalEnergies Orange EDF et Renault. https://t.co/vCXtb5g5pF La fuite de donnes de Loxam a expos des"
X Link 2026-02-04T15:49Z [----] followers, [----] engagements

"🚨 Breach Alert: Coinbase (USA) Insider Access via Contractor Date: Dec [----] Confirmed Feb [----] A single rogue contractor improperly accessed internal support tool Leaked screenshots (flash posted then deleted on Telegram by Scattered Lapsus Hunters) Exposed (limited scope [--] users): - Full names emails DOB phone numbers - KYC/verification details - Trading data: wallet balances (one $300k visible) transactions - Internal support comments No external system compromise no passwords/private keys/funds stolen directly Response: Contractor terminated extra controls added users notified + identity"
X Link 2026-02-05T12:39Z [----] followers, [---] engagements

"🚨 Ransomware Alert DragonForce claims breach of Perpetuuiti [---] GB exfiltrated: source code configs install files exposed. Vendor specializes in IT resilience/DR Known clients incl. US entities: -Delta Airlines -PepsiCo -Jet Aviation Others: Vodafone Reliance/JIO Bombay Stock Exchange ICICI Bank Nokia Amdocs TATA Motors. Supply-chain risk elevated monitor for secondary impacts. No public confirmation from victim yet. #Ransomware #DragonForce #CyberSecurity #Perpetuuiti http://ptechnosoft.com http://ptechnosoft.com"
X Link 2026-02-05T13:43Z [----] followers, [---] engagements

"🚨DumpSec est parti trs loin. Les donnes partages sont trs sensibles/personnelles le rpercussions peuvent tre colossales et extrmement dangereuses pour les victimes: [--]. Identit des personnes - Civilit - Nom - Prnom - Date de naissance - Dpartement / lieu de naissance - ge implicite ou anne de naissance [--]. Coordonnes professionnelles - Adresses email (toutes au domaine @assemblee-nationale.fr) - Numros de tlphone mobile /fixe [--]. Adresses postales - Adresses Paris (sige de l'Assemble) - Adresses personnelles en province - Codes postaux - Villes / communes - Complments d'adresse (btiment tage"
X Link 2026-02-05T19:33Z [----] followers, 16.2K engagements

"🚨 ✈Fuite chez Air France Un hacker affirme avoir actuellement accs au panel admin dAir France + une mthode pour extraire plus de [--] millions de lignes clients via une faille Donnes qui fuitent apparemment : Nom / Prnom Email Tlphone Date de naissance Adresse postale partielle Dates & montants dachats Numros de dossier / rservation Mthode en vente en ce moment sur plusieurs forums underground. Les clients risquent du phishing massif #DataBreach #AirFrance #CyberSecurite #RGPD #FuiteDeDonnees 🚨✈AIR FRANCE ADMIN PANEL EXPOSED: +2 MILLION PURCHASE RECORDS ACCESSIBLE A threat actor claimed"
X Link 2026-02-06T07:52Z [----] followers, 20.8K engagements

"🚨 Une magistrate de [--] ans Grenoble + sa mre (66 ans) enleves & squestres durant 30h Enlvement dans la nuit du [--] au [--] fv Saint-Martin-le-Vinoux (Isre) elles ont t retrouves blesses/ligotes ce matin dans un garage Bourg-ls-Valence (Drme). Piste: en lien avec la cryptomonnaie le compagnon dirige une socit crypto (Lyon). A ce stade aucun lien avec le job de magistrate. Le secteur crypto attire Sources : - BFMTV : - Le Dauphin : - Le Monde : #Crypto #Enlevement #Grenoble #FaitsDivers"
X Link 2026-02-06T12:44Z [----] followers, [---] engagements

"🚨 Romania's state oil pipeline operator Conpet hit by Qilin ransomware. 1TB data allegedly stolen (financial docs + passport scans leaked as proof). Website down but SCADA/OT & oil transport fully operational. Qilin on fire in early [----]. #Ransomware #Qilin #CyberAttack #CriticalInfrastructure #Romania https://twitter.com/i/web/status/2019797226701144517 https://twitter.com/i/web/status/2019797226701144517"
X Link 2026-02-06T15:35Z [----] followers, [---] engagements

"🚨 LOGILITY (US supply chain software provider) hit by CoinbaseCartel The group claims exfiltration of internal data on their dark web site (no encryption pure data theft) Potentially exposed high-profile clients include: Husqvarna Johnson Controls Tillamook Red Wing Shoes Fender Big Lots Parker Hannifin Major supply chain & reputational risks for these big names #CyberSecurity #DataBreach #Ransomware #CoinbaseCartel https://twitter.com/i/web/status/2019817583180963962 https://twitter.com/i/web/status/2019817583180963962"
X Link 2026-02-06T16:56Z [----] followers, [---] engagements

"🚨 Qilin just dropped A.B. Data (abdata.com) on their leak site Samples pulled straight from Qilin's DLS include: - Assignment & Agency Agreements (e.g. First Western Trust Bank Chicago Clearing Corporation exclusivity 12% fees on settlements) - Master Proof of Claim & Release forms (Evolent Health securities litigation via Financial Recovery Technologies LLC) - DocuSign Completion Certs - Consumer claim forms (American Airlines Checked Bag Refund settlement) What A.B. Data actually does Founded in [----] and headquartered in Milwaukee WI A.B. Data Ltd. is one of the leading class action"
X Link 2026-02-07T22:42Z [----] followers, [---] engagements

"πŸ”΄ Donnes de sant des Franais : le gouvernement va lancer un appel d'offres pour sortir de Microsoft Azure Hbergement actuel : Microsoft Azure depuis [----] (6 ans) exposition potentielle via Cloud Act US Annonce (06/02/2026 ministre Stphanie Rist) : - Lappel d'offres sera lanc le 09/02/2026 - Migration complte vers plateforme europenne "scurise rsiliente et non soumise aux lois extra-UE" - Attribution march fin mars [----] - Migration acheve fin [----] Candidats probables : OVHcloud Orange Business Cloud Temple (Atos) etc. Donnes concernes : base anonymise mais ultra-sensible (ge poids pathologies"
X Link 2026-02-08T06:54Z [----] followers, [----] engagements

"🚨 Alleged data breach - University of California (UC San Diego) Threat actor: LunarisSec They claim to have attacked UC San Diego / University of California today (08 Feb 2026) but no data sample no dump link no details on volume or type of data have been shared publicly. Not confirmed by the university No official statement from UC/UCSD yet No credible media coverage or secondary verification Confidence level: Low (possible exaggeration / access to minor/unimportant asset) #DataBreach #CyberSec #LunarisSec https://twitter.com/i/web/status/2020464534985539977"
X Link 2026-02-08T11:47Z [----] followers, [---] engagements

"@hish_cok @Ced_haurus On y reviendra πŸ˜‚"
X Link 2026-02-10T12:58Z [----] followers, [--] engagements

"🚨 Fuite de donnes pour Ciffreo Bona 70k mot de passes dcrypts Ngoce en matriaux BTP (gros uvre cloisons cuisine sanitaire) clients pros & particuliers Donnes : Nom Prnom Email Mot de passe dcrypts Adresse postale etc. ⚠Pas de confirmation de lentreprise pour le moment #breach #dataleak #CiffreoBona"
X Link 2026-02-10T14:16Z [----] followers, [----] engagements

"🚨 list comme victime par Cl0p Nouveau tagging sur le leak site CL0P : (SCI B09 socit civile immobilire cre en [----] Lyon spcialise dans l'acquisition la gestion et la location de terrains et biens immobiliers) apparat maintenant parmi les victimes revendiques par le groupe Cl0p. Pas de com' officielle de la SCI pour l'instant ni dtails des donnes impactes ni sur le volume de donnes exfiltres #Cl0p #Ransomware #Immobilier http://b09.fr http://b09.fr"
X Link 2026-02-10T19:19Z [----] followers, [---] engagements

"🚨 Ransomware Alert Sinobi claims breach of Snyder Diamond (USA) Snyder Diamond a family-owned luxury retailer specializing in high-end kitchen & bath fixtures appliances plumbing hardware and design services since [----]. Operates showrooms across Southern California (Santa Monica Pasadena Van Nuys etc.) serving designers builders and homeowners. Claim details: Added to Sinobi's leak site on Feb [--] [----]. No data samples size or specifics released yet Potential impacts: If confirmed risks include exposure of customer PII (names addresses payment info) internal financials vendor contracts"
X Link 2026-02-10T20:35Z [----] followers, [---] engagements

"πŸš¨πŸ”΄ Mise jour Fuite Safran Le hacker continue d'enrichir la fuite initiale (718 [---] lignes de commandes emails pros donnes logistiques clients comme Air France China Southern etc.) en diffusant maintenant des informations trs prcises sur la maintenance des avions de plusieurs compagnies ariennes : pices rparations types dappareils documents techniques etc. Message direct du hacker il y a peu : Safran we are starting to get impatient. Please contact us via the applications that were sent to you. Silence total du groupe Safran ce stade. Le risque s'intensifie rapidement. #Safran #CyberSec"
X Link 2026-02-11T12:08Z [----] followers, [----] engagements

"🚨 Cyber espionnage asiatique: [--] pays [--] organisations touches La Chine en tte avec des campagnes massives et ultra-cibles. Core du Nord plus sur le vol financier/crypto. 1/ PRC (Chine) domine : - UNC3886 (li la Chine) a cibl les [--] gros telcos de Singapour (Singtel StarHub M1 Simba) en [----] confirmation officielle CSA Singapour le 9-10 fvrier [----]. Zero-days sur edge devices (Fortinet VMware etc.) pour persistance. - Salt Typhoon toujours actif : Norvge confirme intrusions sur entreprises norvgiennes (PST report 2026). US : blocage rapports Mandiant par AT&T/Verizon snatrice Cantwell demande"
X Link 2026-02-11T12:19Z [----] followers, [---] engagements

"Il va falloir se poser de bonnes questions avec cette nouvelle techno : Lunettes connectes cam imaginons un hack sur ce genre de lunettes jackpot pour les hackers: Rcolte dinfo passif pas dintrusion dans le SI de la victime donc pas dtectable Belle volution. FLASH Un intrimaire de [--] ans employ sur la chane dassemblage des Rafale chez Dassault Cergy (Val-dOise) a t plac en GARDE VUE. Il est souponn davoir utilis des lunettes quipes dune camra sur le site industriel. Les faits pourraient tre qualifis d https://t.co/dddt6NOTIO FLASH Un intrimaire de [--] ans employ sur la chane dassemblage des"
X Link 2026-02-11T12:27Z [----] followers, [----] engagements

"Safran dment une quelconque intrusion dans leur SI et pointe du doigt . Un tiers @seblatombe Safran na pas t victime dune cyber-attaque. Les donnes mentionnes proviennent dune fuite accidentelle de la part dun tiers sans intrusion dans les systmes de Safran. Cette fuite a t trs rapidement contenue et Safran a pris toutes les mesures adquates. Aucune @seblatombe Safran na pas t victime dune cyber-attaque. Les donnes mentionnes proviennent dune fuite accidentelle de la part dun tiers sans intrusion dans les systmes de Safran. Cette fuite a t trs rapidement contenue et Safran a pris toutes les"
X Link 2026-02-11T19:08Z [----] followers, [---] engagements

"@brk_4k En dacia spring motivs les gars πŸ˜‚πŸ˜‚πŸ˜‚"
X Link 2026-02-11T20:14Z [----] followers, [----] engagements

"🚨 New claim alert: WorldLeaks lists Indiana Auto Auction as a victim Sector: Automotive (Midwest US dealer auctions) No official confirmation from the victim yet site is still up and running with no breach mentions or alerts. Medium severity: likely dealer info VINs contacts possibly some PII/financial bits. #DataBreach #WorldLeaks #IndianaAutoAuction https://twitter.com/i/web/status/2021979099556712695 https://twitter.com/i/web/status/2021979099556712695"
X Link 2026-02-12T16:05Z [----] followers, [---] engagements

"🚨Mise jour SAFRAN: nouvelles infos fournies par @seblatombe On attend la suite 🍿 πŸ”΄ Dmenti de Safran : le groupe revendiquant lattaque me rpond et conteste la version officielle Alors que Safran parle dune fuite accidentelle chez un tiers et dune exposition de quelques minutes une source se prsentant comme lie au groupe revendiquant https://t.co/t50RBNrR2D πŸ”΄ Dmenti de Safran : le groupe revendiquant lattaque me rpond et conteste la version officielle Alors que Safran parle dune fuite accidentelle chez un tiers et dune exposition de quelques minutes une source se prsentant comme lie au"
X Link 2026-02-13T08:05Z [----] followers, [----] engagements

"Raction classique lorsqu'un grand groupe est impact: on nie les faits tant qu'on peut histoire de sauver l'image et de ne pas froisser les actionnaires Aprs ils jouent peut-tre sur les mots: "notre SI n'a pas t impact c'est une entreprise tierce bla bla bla" = on tombe sur une attaque type island hopping: intrusion chez le tiers rcupration des credentials connexion "lgitime" sur le SI de SAFRAN (simple supposition) https://twitter.com/i/web/status/2022222610528911580 https://twitter.com/i/web/status/2022222610528911580"
X Link 2026-02-13T08:13Z [----] followers, [----] engagements

"🚨 Potentielle fuite de donnes chez Kimsufi (OVHcloud) Revendication : 13/02/2026 via channel Telegram de Z-SH4DOWSPEECH Donnes compromises : Adresses domicile + infos facturation Affiliations / donnes universitaires Bases MySQL (internes ou clients) Donnes bio + formulaires dapplication Photos (ID avatars uploads) Et "more" (emails tlphones creds serveurs ) Pas de sample public pour linstant Volume inconnu #DataBreach #Kimsufi #OVH"
X Link 2026-02-13T15:07Z [----] followers, 12.8K engagements

"@SirAfuera Dites on en parle aussi des taxi qui te prennent [--] clients en mme temps et qui facturent lassurance maladie [--] trajets distincts alors que le point de dpart et darrive est commun aux trois"
X Link 2026-02-13T17:00Z [----] followers, [---] engagements

"🚨 Zebra Technologies: Alleged Breach (Jan 2026) - 1.5GB data leaked on BreachForums - Compromised assets: Source code (core products + Profitect/Antuit acquisitions) SQL dumps & database schemas Terraform / IaC files Config files (Dev/QA/Stage/Prod) API tokens + hardcoded credentials - Exposed client references: IKEA Walgreens Boots Ahold Delhaize - High supply-chain risk for retail & pharmacy sectors - No official statement from Zebra yet #DataBreach #CyberSecurity #ZebraTechnologies #SupplyChain #Infosec #ThreatIntel https://twitter.com/i/web/status/2016457682392166741"
X Link 2026-01-28T10:25Z [----] followers, [----] engagements

"🚨 Zebra Technologies Potentielles rpercutions en Europe et en France 🚨 Zebra Technologies: Alleged Breach (Jan 2026) - 1.5GB data leaked on BreachForums - Compromised assets: Source code (core products + Profitect/Antuit acquisitions) SQL dumps & database schemas Terraform / IaC files Config files https://t.co/GNBxx9E6ee 🚨 Zebra Technologies: Alleged Breach (Jan 2026) - 1.5GB data leaked on BreachForums - Compromised assets: Source code (core products + Profitect/Antuit acquisitions) SQL dumps & database schemas Terraform / IaC files Config files https://t.co/GNBxx9E6ee"
X Link 2026-01-28T10:44Z [----] followers, [----] engagements

"🚨 Epstein Files DOJ release Jan [--] [----] πŸ”₯ FBI informant (2017) alleged Epstein had a personal hacker: Italian from Calabria Zero-day expert: iOS BlackBerry Firefox Ex-Black Hat board member Sold company to CrowdStrike (fall 2017) became VP Sold exploits to UK/US/African gov + Hezbollah for a trunk full of cash πŸ’°πŸ§³ Profile matches Vincent Iozzo (cyber sources). Name redacted. Key doc: EFTA01683874.pdf (Data Set 10) πŸ”— #Epstein #Cybersecurity #ZeroDay https://www.justice.gov/epstein/files/DataSet%2010/EFTA01683874.pdf https://www.justice.gov/epstein/files/DataSet%2010/EFTA01683874.pdf"
X Link 2026-01-31T19:46Z [----] followers, [----] engagements

"🚨 Fuite Safran Group 718k lignes d'ordres supply chain leakes sur BreachForums Revendiqu : base extraite du portail orders/clients Safran (arospatial & dfense) Donnes impactes (chantillons fournis) : πŸ‘‰πŸ» Infos clients : ID client noms complets (ex: Air France Industries China Southern Airlines Iberia GAMECO REVIMA) emails pros tlphones numros PO πŸ‘‰πŸ» Dtails commandes : Order ID / Header ID / Sales Order Number / ERP Ref ID statuts sources (SITA/WEB) quantits commandes units numros de pices descriptions pices πŸ‘‰πŸ» Prix & remises : prix unitaires (jusqu' 10k USD) % discount devises (USD/EUR)"
X Link 2026-02-10T18:12Z [----] followers, [----] engagements

"🚨 LEAK PAYTOP Fintech franaise rgule ACPR Mise en vente des informations par Z-SH4DOWSPEECH Donnees exposes : - accs MySQL - login - [--] bases visibles : mysql schema_performance sy wafa16 wafa_legacy - Donnes financires - KYC Partenariat historique Wafacash / Attijariwafa Bank (bases wafa* trs probablement contenant KYC transactions Maroc Europe) Pas encore de dump public ni de com' officielle PayTop #PayTop #Fintech #ACPR https://twitter.com/i/web/status/2022563268728955382 https://twitter.com/i/web/status/2022563268728955382"
X Link 2026-02-14T06:47Z [----] followers, [---] engagements

"🚨 Encore un recoupement dinfo partir de plusieurs leaks. Cette fois la cible est Coinbase et plus prcisment les clients franais. Bravo ils deviennent colo: le recyclage est en marche πŸ‘ πŸ”΄ Coinbase : prs de [--] [---] Franais exposs dans une base en vente (identits tlphones e-mails) Un hacker revend une base prsente comme Coinbase France [----] avec [--] [---] profils de Franais (nom email tlphone). Daprs lanalyse il ne sagit pas dune fuite directe https://t.co/WXw4nHmE8Y πŸ”΄ Coinbase : prs de [--] [---] Franais exposs dans une base en vente (identits tlphones e-mails) Un hacker revend une base prsente"
X Link 2026-02-14T07:44Z [----] followers, [---] engagements

"🚨 Breach Alert: Hendrik Veder Group (hendrikveder.com) claimed hit by Avangard Sec ransomware Victim: Historic Dutch company (est. 1800) specializing in steel wire ropes synthetic fiber ropes lifting slings rigging services & heavy-lift solutions for offshore (oil/gas/wind) maritime towing & heavy industry. Claimed turnover $23M (real post-2025 DSF merger: 100M+ combined). Key supplier to Northern Europe energy & shipping sectors. Avangard Sec claim (Feb [--] 2026): - Access gained to admin panels + corporate networks (multiple large companies involved) - [------] files encrypted - [--] TB"
X Link 2026-02-08T19:00Z [----] followers, [---] engagements

"🚨 Conduent breach scale explodes now 25M affected (15.4M in Texas alone) Victim: Conduent (business process outsourcing giant for state govs DMVs health/insurance services) Timeline recap: - Intrusion: Oct [----] - Discovery & containment: Jan [--] [----] - Ransomware (SafePay claimed 8TB exfiltrated) - Public outages: Jan [----] (multiple states disrupted: driver's licenses vehicle regs social services) - SEC disclosure (cyberattack confirmed): Apr [----] - Initial victim count filings: 10.5M (mostly Oct/Nov [----] e.g. Oregon) - Latest spike: Feb [----] Texas AG filing 15.4M affected there (up from 4M"
X Link 2026-02-11T06:23Z [----] followers, [----] engagements

"🚨 Ransomware Alert: On-Point Defense Technologies Listed as Victim by Qilin Victim: On-Point Defense Technologies (onpoint-dt.com) a veteran-owned small business based in Fort Walton Beach Florida. They specialize in defense tech rapid prototyping systems engineering manufacturing testing and depot support for the U.S. Department of Defense and allied forces. Key focus areas include upgraded missile launchers (like TOW systems) thermal sighting tech next-gen power solutions and obsolescence management for mission-critical military platforms. Claim Details: Added to Qilin's dark web leak site"
X Link 2026-02-11T19:53Z [----] followers, [---] engagements

"🚨 NEW CLAIM : ShinyHunters drops [---] GB of PII from Figure Technology Solutions US fintech (blockchain HELOCs & mortgages) hit. Impacted data (alleged): Full names SSNs addresses DOBs emails phones Income bank records loan apps KYC docs & credit histories High risk for fraud & ID theft. No victim statement yet. #ShinyHunters #Figure #Fintech https://twitter.com/i/web/status/2022182241921564738 https://twitter.com/i/web/status/2022182241921564738"
X Link 2026-02-13T05:33Z [----] followers, [----] engagements

"🚨 HP Poly (ex-Polycom) hit by Everest Ransomware The group claims to have stolen [--] GB of internal data from the US computer hardware company including personal documents and client information. Note: Attackers are still using the old "Polycom" branding likely targeting legacy systems pre-2022 HP acquisition. HP says it's investigating. #Ransomware #HPPoly #Polycom #Everest https://twitter.com/i/web/status/2022699256289661417 https://twitter.com/i/web/status/2022699256289661417"
X Link 2026-02-14T15:47Z [----] followers, [---] engagements

"🚨 NEW CLAIM ShinyHunters targets Canada Goose 600k+ Records compromised Over [------] records containing - PII - Payment/financial information (cards financial details) Claimed: Feb [--] [----] (fresh drop today) High risk: - direct card fraud - identity theft - targeted phishing on high-value customers. No official statement from Canada Goose yet #DataBreach #ShinyHunters #CanadaGoose https://twitter.com/i/web/status/2022749546590151049 https://twitter.com/i/web/status/2022749546590151049"
X Link 2026-02-14T19:07Z [----] followers, [---] engagements

"🚨 ALLEGED PALANTIR MEGA-BREACH @KimDotcom (ex-Megaupload) affirme un hack IA qui aurait donn un accs super-user total Dcouvertes prsumes : Surveillance massive de dirigeants (Trump Vance Musk) Archive de chantage plantaire (backdoors appareils jets voitures) Rle dans armes nuclaires/bio pour lUkraine + ciblage IA Gaza Palantir (via Peter Thiel & Founders Fund) est directement li Persona la solution de vrification dge utilise par : - Discord (exprimentation UK + rollout mondial obligatoire ds mars 2026) - Reddit - Roblox Des millions de selfies biomtriques pices didentit et donnes dge (dont"
X Link 2026-02-16T06:23Z [----] followers, 45.8K engagements

"🚨 Ministre de l'Intrieur encore fuit Peut-tre que oui peut-tre que non Les revendications portent sur : [--] fichiers (.crt .crl .pem .xml) extraits de serveurs MININT. Inclut : - AC-racine-ministere-Interieur-2017.crt - Police-nationale.crt - PS_ETAT_CIVIL.crt (tat civil ) Pourquoi jai des doutes Parce que la plus parts des cls mentionnes sont au format crt et quelles sont tout simplement en libre accs via une url en .gouv.fr Pas de preuves pour linstant quils ont leur disposition des cls prives donc peu dutilit #DataBreach #CyberSec #MinistreIntrieur #PoliceNationale #PKI"
X Link 2026-02-05T20:50Z [----] followers, [----] engagements

"🚨 Fuite de donnes pour Gustave auto: des IBAN dans la nature Victime : Gustave auto startup franaise de gestion de flotte & convoyage auto (clients Sixt Virtuo etc.) Revendication poste aujourd'hui (13/02/2026) Donnes compromises (selon l'acteur + sample visible) : ID date de cration noms Adresses compltes (ligne [--] ville code postal pays) Dtails facturation IBAN + BIC (donnes bancaires ) SIRET TVA emails tlphones Missions photos info entreprises (7M lignes revendiques) Volume annonc : [---] GB multi-fichiers JSON Statut 13/02/2026 08h30 : - Pas de com officielle Gustave - Site toujours up zro"
X Link 2026-02-13T07:42Z [----] followers, [----] engagements

"@CNIL cest normal de garder [--] ans dhistorique 🚨 GROS LEAK Fdration Franaise d'Athltisme (FFA) Un hacker met en vente 2.712.073 enregistrements dadhrents Donnes exposes (confirmes via sample + personne publique identifiable) : Nom / prnom / nom de naissance Date & lieu de naissance (ville + https://t.co/jfENyRPjsS 🚨 GROS LEAK Fdration Franaise d'Athltisme (FFA) Un hacker met en vente 2.712.073 enregistrements dadhrents Donnes exposes (confirmes via sample + personne publique identifiable) : Nom / prnom / nom de naissance Date & lieu de naissance (ville + https://t.co/jfENyRPjsS"
X Link 2026-02-14T12:37Z [----] followers, [---] engagements

"🚨 Potentielle fuites de donnes pour FLEETEE (France / Outre-mer) [---] [---] lignes dans la nature pour les Clients loueurs de vhicules Bien que lauteur soit banni du forum pour raison de scam des donnez son malgr tout exposes (donc confirmer sil sagit bien de donnes en lien avec FLEETEE je supprimerai si besoin) Donnes exposes : Nom / Prnom Email (quand renseign) Tlphone (trs souvent prsent) Base ultra cible DOM-TOM : - [---] = Guyane franaise (35 % des numros) - [---] / [---] = Martinique / Guadeloupe - Beaucoup de +33 (mtropole) SaaS de gestion de flotte / location pro bookings maintenance"
X Link 2026-02-14T12:43Z [----] followers, [---] engagements

"🫀 a va bien se passer ⚑ Coup de tonnerre : la fuite de donnes de la FFSA porterait sur la base de donnes complte de [--] million de membres avec des informations personnelles dtailles (identit adresses tlphones emails donnes de licence structures etc.). Parmi les profils cits dans https://t.co/Nyqc5lAx0I ⚑ Coup de tonnerre : la fuite de donnes de la FFSA porterait sur la base de donnes complte de [--] million de membres avec des informations personnelles dtailles (identit adresses tlphones emails donnes de licence structures etc.). Parmi les profils cits dans https://t.co/Nyqc5lAx0I"
X Link 2026-02-14T13:46Z [----] followers, [---] engagements

"🚨 Immovalie : fuite de donnes immo franaise Un hacker vient de balancer [--] Go complets de lagence Immovalie (la plus petite des [--] concernes). Dedans [----] PDFs clients (contrats mandats pices didentit) [---] DLL (backups logiciels) Logs configs bases clients Cest [--] % des [---] Go quil vend. Autant dire que les [--] autres sont bien garnies. Clients : vos dossiers complets sont dans la nature. #databreach #immovalie #immobilier https://twitter.com/i/web/status/2022670385414619173 https://twitter.com/i/web/status/2022670385414619173"
X Link 2026-02-14T13:52Z [----] followers, [---] engagements

"@seblatombe Jai vu a ce matin hop on prend direct la source le gars doute de rien 😳"
X Link 2026-02-14T14:12Z [----] followers, [---] engagements

"🚨 Alerte DDoS pour Capgemini Le groupe Inteid revendique une attaque DDoS contre le site de Capgemini(capgemini.com) gant franais des services IT. πŸ”— Preuve de downtime: https://check-host.net/check-report/396fd1cfka2c noter : le site semble actuellement accessible (up). Possible opration de faible intensit #DDoS #Capgemini #Inteid https://twitter.com/i/web/status/2022679383874376052 https://twitter.com/i/web/status/2022679383874376052"
X Link 2026-02-14T14:28Z [----] followers, [----] engagements

"Les grosses boites de presta ont intrt avoir les reins solides vu les clients et le maillage national. S'il devait y avoir une compromission leur niveau c'est la boite de pandore qui s'ouvre. On a bien vu la secousse qu' produit la compromission d'une instance GitLab interne chez Red Hat Consulting. (oui oui la France a t impact) Hum. 2me gros presta franais vis par des attaques DDoS. Hum. 2me gros presta franais vis par des attaques DDoS"
X Link 2026-02-14T14:51Z [----] followers, [--] engagements

"Exactement. Avec les PDP on passe dun systme dcentralis une centralisation massive des donnes de facturation. Mme si lobjectif est la lutte contre la fraude la TVA le risque est norme. Surtout quand on voit la scurit chez certains hbergeurs Tas vu un truc concernant la dure de conservation Jai pas encore tout lu. https://twitter.com/i/web/status/2023057185354227839 https://twitter.com/i/web/status/2023057185354227839"
X Link 2026-02-15T15:29Z [----] followers, [--] engagements

"On pousse la rflexion sur les sources et vracits de ce quavance Kim Dotcom. Voici la rponse de Grok: Sources et vrification des affirmations de Kim Dotcom sur le prtendu hack de Palantir (post du [--] fvrier 2026) Voici le dcryptage point par point avec sources : [--]. Le hack par AI agent avec accs super-user - Aucune confirmatio Aucune agence de presse crdible (Reuters BBC NYT Bloomberg TechCrunch) ne rapporte de brche chez Palantir en [----]. Le compte officiel @PalantirTech na rien publi sur le sujet. Les discussions sur X Reddit ou forums (TigerDroppings) citent uniquementle post de Kim."
X Link 2026-02-16T10:15Z [----] followers, [----] engagements

"Bonus : Le risque vrification dge (comme dans le post @justabreach) Cest rel et document : - Persona (solution de vrification biomtrique dge) est finance par Peter Thiel (cofondateur de Palantir) via Founders Fund et dautres fonds. - Utilise par : - Discord (test UK + rollout mondial prvu mars 2026). - Reddit (surtout UK). - Roblox (scan facial obligatoire depuis dbut 2026). - Aussi LinkedIn DoorDash etc. - Des selfies pices didentit et donnes biomtriques de millions dutilisateurs (dont mineurs) transitent par Persona. Sources : - Open Rights Group Kotaku PC Gamer Reddit discussions (fv."
X Link 2026-02-16T10:15Z [----] followers, [----] engagements

"🚨 Ransomware Attack Disrupts BridgePay Network Solutions Major US Payment Processor Offline Since Feb [--] [----] Florida-based BridgePay (payment gateway for merchants municipalities & integrators nationwide) confirmed a ransomware incident causing full system-wide outage. No public claim by any ransomware group yet. πŸ”Ή Timeline - Feb [--] 3:29 EST: Initial intermittent disruptions on API virtual terminal & reporting. - Mid-morning: Outage escalates to all production systems. - Evening (7 PM EST): BridgePay publicly confirms ransomware attack. - As of Feb 10: Still offline recovery ongoing"
X Link 2026-02-11T06:15Z [----] followers, [---] engagements

"🚨 Breach Sale Alert: Webster Bank & Capital One Accounts (US-only) A threat actor is advertising on DarkForums the sale of alleged fresh bank account details: - Source claimed: Compromised contact center (exclusive not yet public) - Data per record: Full name DOB address email phone estimated income/credit score range (mostly "Low") routing number account number (+ sometimes gov ID/license in some cases) No public disclosure or confirmation from Capital One or Webster Bank as of Feb [--] [----]. No matching recent contact center incidents reported in open sources/threat intel feeds. Likely"
X Link 2026-02-11T20:50Z [----] followers, [---] engagements

"βš πŸ”΅ Aspirateur robot DJI Romo : un bidouilleur dcouvre un micro dans son aspirateur. Initialement il voulait juste piloter son robot connect avec la tlcommande de sa PlayStation mais au lieu de a il dcouvre un token permettant daccder distance aux camras/micros intgrs de [----] appareils dans le monde. Ah si les aspirateurs sy mettent. Avec un peu de chance ltat va se pencher sur le sujet linterdire aux mineurs pour les prserver et il faudra srement donner sa CNI pour en acheter un πŸ˜³πŸ€” Priorits [----] : protger les enfants des robots-mnagers espions. Jironise mais: utiliser une telle faille dans"
X Link 2026-02-16T19:21Z [----] followers, [---] engagements

"Source: https://www.numerama.com/cyberguerre/2180301-cest-vraiment-bizarre-davoir-un-micro-sur-un-aspirateur-il-bidouille-son-aspirateur-robot-et-decouvre-une-faille-geante.html https://www.numerama.com/cyberguerre/2180301-cest-vraiment-bizarre-davoir-un-micro-sur-un-aspirateur-il-bidouille-son-aspirateur-robot-et-decouvre-une-faille-geante.html"
X Link 2026-02-16T19:23Z [----] followers, [--] engagements

"🚨 Fuite de donnes chez SOCLOZ : [--] millions de lignes exposes (retail omnicanal FR/EU) DumpSec a encore frapp Dbut [----] la plateforme SOCLOZ (gestion stocks rsas Click & Collect Ship-from-Store) a subi une intrusion majeure. Dump en vente sur BreachForums depuis aujourd'hui (fvrier 2026). Donnes extraites : reservation_id customer_title customer_first_name / customer_last_name / customer_name customer_email customer_phone marketing_opt_in product_name / product_reference (SKU) / product_attributes (taille couleur) product_quantity / unit_price / subtotal brand (marque produit)"
X Link 2026-02-16T20:18Z [----] followers, [--] engagements

"βš πŸ”΅ Aspirateur robot DJI Romo : un bidouilleur dcouvre un micro dans son aspirateur. Initialement il voulait juste piloter son robot connect avec la tlcommande de sa PlayStation mais au lieu de a il dcouvre un token permettant daccder distance aux camras/micros intgrs de [----] appareils dans le monde. Ah si les aspirateurs sy mettent. Avec un peu de chance ltat va se pencher sur le sujet linterdire aux mineurs pour les prserver et il faudra srement donner sa CNI pour en acheter un πŸ˜³πŸ€” Priorits [----] : protger les enfants des robots-mnagers espions. Jironise mais: utiliser une telle faille dans"
X Link 2026-02-16T19:21Z [----] followers, [---] engagements

"Source: https://www.numerama.com/cyberguerre/2180301-cest-vraiment-bizarre-davoir-un-micro-sur-un-aspirateur-il-bidouille-son-aspirateur-robot-et-decouvre-une-faille-geante.html https://www.numerama.com/cyberguerre/2180301-cest-vraiment-bizarre-davoir-un-micro-sur-un-aspirateur-il-bidouille-son-aspirateur-robot-et-decouvre-une-faille-geante.html"
X Link 2026-02-16T19:23Z [----] followers, [--] engagements

"⚠ X impact par une indispo partielle ce lundi [--] fvrier [----] Pic +40 [---] rapports Downdetector ce matin (US/Europe). Problmes : feeds non chargs erreurs Something went wrong login/posting impacts. Rtablissement partiel observ depuis 15h CET. On remarquera galement que la courbe Cloudflare suit le mouvement"
X Link 2026-02-16T15:09Z [----] followers, [---] engagements

"🚨 Au tour du @CNRS de fuiter - Nom prnoms - Adresses - RIB - Num de scu La suite πŸ‘‡ 🚨 CYBERALERTE Fuite de donnes au CNRS : N de scu RIB adresses compromis Le @CNRS a confirm une exfiltration de donnes aprs des tlchargements non autoriss sur un serveur interne rapidement isol. Lincident naurait pas impact le reste des infrastructures et https://t.co/XCNk4lRLCM 🚨 CYBERALERTE Fuite de donnes au CNRS : N de scu RIB adresses compromis Le @CNRS a confirm une exfiltration de donnes aprs des tlchargements non autoriss sur un serveur interne rapidement isol. Lincident naurait pas impact le reste"
X Link 2026-02-16T14:57Z [----] followers, [---] engagements

"🚨 CYBERALERTE Fuite de donnes au CNRS : N de scu RIB adresses compromis Le @CNRS a confirm une exfiltration de donnes aprs des tlchargements non autoriss sur un serveur interne rapidement isol. Lincident naurait pas impact le reste des infrastructures et a t notifi la CNIL et lANSSI. Les personnes concernes sont les agents (titulaires et non titulaires) ayant travaill au CNRS avant le [--] dcembre [----]. Le nombre exact de victimes na pas t communiqu ce stade. Les donnes exposes incluent : nom prnom date de naissance adresse postale numro de scurit sociale RIB ainsi que des informations"
X Link 2026-02-16T13:11Z 93.1K followers, [----] engagements

"🚨 Fuite de donnes chez Auto-ICI (mandataire auto FR) 203k clients exposs (potentiel repost) Il me semble que le leak a dj t revendiqu dbut janvier [----] mais je nai pas vu de post en parler Donnes : Nom complet genre ID compte Tlphone email adresse complte Pas de donnes de paiement / login Aucune com' Auto-ICI pour l'instant Indice de confiance: 3/4 #DataBreach #AutoICI #RGPD"
X Link 2026-02-16T13:13Z [----] followers, [---] engagements

"🚨 Fuite de donnes pour TooEasy (agence web/digital FR) Un hacker propose un dump [--] Mo labelis tooeasy [----] (les preuves mis disposition dates majoritairement de 2017/2018) Indice de confiance: 2/4 Donnes impactes: Noms emails tlphones IP Dossiers candidatures complets (CV + lettres motiv' entires) Bonus inattendu : immatriculations camions (projet client ) Vrifi par plusieurs users BF no doubt this is the tooeasy.fr db Pas de com' TooEasy pour l'instant #DataBreach #TooEasy #RGPD"
X Link 2026-02-16T10:50Z [----] followers, [---] engagements

"🚨 ALLEGED PALANTIR MEGA-BREACH @KimDotcom (ex-Megaupload) affirme un hack IA qui aurait donn un accs super-user total Dcouvertes prsumes : Surveillance massive de dirigeants (Trump Vance Musk) Archive de chantage plantaire (backdoors appareils jets voitures) Rle dans armes nuclaires/bio pour lUkraine + ciblage IA Gaza Palantir (via Peter Thiel & Founders Fund) est directement li Persona la solution de vrification dge utilise par : - Discord (exprimentation UK + rollout mondial obligatoire ds mars 2026) - Reddit - Roblox Des millions de selfies biomtriques pices didentit et donnes dge (dont"
X Link 2026-02-16T06:23Z [----] followers, 45.8K engagements

"On pousse la rflexion sur les sources et vracits de ce quavance Kim Dotcom. Voici la rponse de Grok: Sources et vrification des affirmations de Kim Dotcom sur le prtendu hack de Palantir (post du [--] fvrier 2026) Voici le dcryptage point par point avec sources : [--]. Le hack par AI agent avec accs super-user - Aucune confirmatio Aucune agence de presse crdible (Reuters BBC NYT Bloomberg TechCrunch) ne rapporte de brche chez Palantir en [----]. Le compte officiel @PalantirTech na rien publi sur le sujet. Les discussions sur X Reddit ou forums (TigerDroppings) citent uniquementle post de Kim."
X Link 2026-02-16T10:15Z [----] followers, [----] engagements

"Bonus : Le risque vrification dge (comme dans le post @justabreach) Cest rel et document : - Persona (solution de vrification biomtrique dge) est finance par Peter Thiel (cofondateur de Palantir) via Founders Fund et dautres fonds. - Utilise par : - Discord (test UK + rollout mondial prvu mars 2026). - Reddit (surtout UK). - Roblox (scan facial obligatoire depuis dbut 2026). - Aussi LinkedIn DoorDash etc. - Des selfies pices didentit et donnes biomtriques de millions dutilisateurs (dont mineurs) transitent par Persona. Sources : - Open Rights Group Kotaku PC Gamer Reddit discussions (fv."
X Link 2026-02-16T10:15Z [----] followers, [----] engagements

"Le post de @KimDotcom πŸ‘‡ https://x.com/kimdotcom/status/2023165849721536672s=46 🚨 ALLEGED PALANTIR MEGA-BREACH @KimDotcom (ex-Megaupload) affirme un hack IA qui aurait donn un accs super-user total Dcouvertes prsumes : Surveillance massive de dirigeants (Trump Vance Musk) Archive de chantage plantaire (backdoors appareils jets https://x.com/kimdotcom/status/2023165849721536672s=46 🚨 ALLEGED PALANTIR MEGA-BREACH @KimDotcom (ex-Megaupload) affirme un hack IA qui aurait donn un accs super-user total Dcouvertes prsumes : Surveillance massive de dirigeants (Trump Vance Musk) Archive de chantage"
X Link 2026-02-16T06:24Z [----] followers, [---] engagements

"🚨 OEC Bretagne (Ordre des Experts-Comptables de Bretagne) nouvelle victime de BravoX Groupe : Bravox (BravoX RaaS rcent merg janv. 2026) Publication prvue dbut mars [----] daprs le compte rebours Volumtrie des donnes voles: - [----] Go - 46K dossiers - 369K fichiers Contenu probable : - Dossiers membres experts-comptables bretons (inscriptions disciplinaire etc.) - Donnes clients des cabinets (fiscaux bilans contrats PII RGPD) - Docs internes Trs sensible : exposition massive RGPD Dans les preuves on peut y voir galement un extrait de casier judiciaire (volet 3) courriers sensibles Pas de"
X Link 2026-02-16T04:46Z [----] followers, [---] engagements

"🚨 NEW SHINYHUNTERS CLAIM Beacon Pointe Advisors LLC. (US Wealth Management) [------] records compromised incl. PII + internal corporate data. FINAL WARNING issued today: reach out by Feb [--] [----] or face full leak Updated: Feb [--] claim (UTC+8 and over fresh drop). No public confirmation from Beacon Pointe yet. High-profile RIA target @beacon #DataBreach #ShinyHunters #BeaconPointe"
X Link 2026-02-15T21:25Z [----] followers, [---] engagements

"🚨 SHINYHUNTERS STRIKES AGAIN Mercer Advisors (Top US RIA) [--] MILLION records compromised: PII + sensitive internal corporate data. Same FINAL WARNING: contact by Feb [--] [----] before leak Claim updated Feb [--] [----]. (UTC+8 and over) Barron's #1 RIA targeted No official statement from @MercerAdvisors yet. Risk of major exposure if no response. #DataBreach #ShinyHunters #MercerAdvisors #Ransomware"
X Link 2026-02-15T21:24Z [----] followers, [---] engagements

"🚨 ALLEGED STUDIO BREACH Millimages (Les Lascars [--] leak) Un hacker (le mme qui a dropp Wakfu S5 chez Ankama plus de dtails chez @seblatombe ) revendique depuis hier le full dump dun nouveau studio FR danimation trs probablement Millimages Contenu circulant/revendiqu : - Film complet 1h30 Les Lascars [--] avec voix off dj enregistres - Assets prod : storyboards animatics etc. Studio prolifique plusieurs projets actifs en [----] : - Pepper (5211 min 2D pr-prod avance livraison fin [----] espre) - Bin Buddies (527 min CG preschool bible & teasers dj pitchs Cartoon Forum/Mipcom) - Molang (saisons en"
X Link 2026-02-15T19:08Z [----] followers, [----] engagements

"πŸš¨πŸ”΄ CYBERALERTE Les Lascars [--] pirate et mis en vente Le mme hacker aprs avoir affirm avoir pirat les serveurs dAnkama Animations et mis en vente les [--] premiers pisodes de Wakfu - Saison [--] prtend dsormais avoir cibl un nouveau studio danimation et mis en vente le film danimation Les Lascars [--] pourtant toujours en cours de production. Daprs la publication le lot comprendrait le film complet (environ 1h30) avec les voix ainsi que du contenu interne de production. Si ces affirmations taient confirmes il sagirait dune fuite majeure de contenus non diffuss avec des risques importants de piratage"
X Link 2026-02-15T17:08Z 93.1K followers, 50.2K engagements

"🚨 ✈ Alleged leak: Aviation Datalink System Problem Database (FANS/CPDLC) NAT region Circulating on BreachForums since Feb [--] [----] linked to Team CyberCrime Indonesia). Claimed content: [--] aircraft technical issues [--] ground system issues Internal NAT Ops Group doc (North Atlantic airspace coordination) FANS 1/A & CPDLC vulnerabilities documented potential interest for aviation cyber threats spoofing research or targeted ops intel. No public confirmation yet from NAT FAA EASA or ANSPs #AviationCyber #CPDLC #FANS #DataLeak"
X Link 2026-02-15T14:58Z [----] followers, [---] engagements

"🚨 NEW CLAIM ShinyHunters targets Canada Goose 600k+ Records compromised Over [------] records containing - PII - Payment/financial information (cards financial details) Claimed: Feb [--] [----] (fresh drop today) High risk: - direct card fraud - identity theft - targeted phishing on high-value customers. No official statement from Canada Goose yet #DataBreach #ShinyHunters #CanadaGoose https://twitter.com/i/web/status/2022749546590151049 https://twitter.com/i/web/status/2022749546590151049"
X Link 2026-02-14T19:07Z [----] followers, [---] engagements

"🚨 HP Poly (ex-Polycom) hit by Everest Ransomware The group claims to have stolen [--] GB of internal data from the US computer hardware company including personal documents and client information. Note: Attackers are still using the old "Polycom" branding likely targeting legacy systems pre-2022 HP acquisition. HP says it's investigating. #Ransomware #HPPoly #Polycom #Everest https://twitter.com/i/web/status/2022699256289661417 https://twitter.com/i/web/status/2022699256289661417"
X Link 2026-02-14T15:47Z [----] followers, [---] engagements

"Qui en doutait πŸ™„ https://news.sky.com/story/navalny-died-after-being-poisoned-with-dart-frog-toxin-13507402 https://news.sky.com/story/navalny-died-after-being-poisoned-with-dart-frog-toxin-13507402"
X Link 2026-02-14T15:40Z [----] followers, [---] engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing