Doxbin, a platform infamous for doxxing and exposing personal information, has suffered a major data breach orchestrated by the hacker group Tooda. The attackers deleted user accounts, locked out administrators, and leaked a massive database containing 136,814 user records, including usernames, email addresses, and a so-called “Blacklist” file—detailing individuals who had allegedly paid to keep their information off the site. The breach appears to be fueled by a long-standing rivalry between hacker groups, with Tooda claiming their attack was in response to accusations against one of their members.
The Handala hacking group, linked to Iranian intelligence, claims to have breached Israel’s police force, stealing 2.1 terabytes of sensitive data, including personnel records, weapons inventories, medical files, and legal case documents. The group says it publicly released 350,000 records.
A coordinated international law enforcement effort has dismantled the dark web data leak and negotiation sites linked to the 8Base ransomware gang. Visitors to the seized sites now see a banner from the Bavarian State Criminal Police Office announcing the takedown.
Cybersecurity firm WatchTowr has uncovered a significant security risk involving abandoned Amazon S3 buckets that could have been exploited by threat actors to distribute malware and backdoors to governments and major corporations.
Cybersecurity firm WatchTowr has uncovered a significant security risk involving abandoned Amazon S3 buckets that could have been exploited by threat actors to distribute malware and backdoors to governments and major corporations.
The rapid rise of the Chinese-made DeepSeek-R1 AI model has not only disrupted the AI market but also attracted cybercriminals looking to exploit its popularity.
Over 57 state-sponsored threat actors linked to China, Iran, North Korea, and Russia have been observed utilizing Google’s AI technology to enhance their cyber and information operations.
A massive botnet comprising approximately 13,000 hijacked MikroTik routers has been deployed to distribute malware through spam campaigns, highlighting the persistent security risks tied to misconfigured networking devices.