Summary: On April 18, 2025, BreachForums faced another outage where claims of a DDoS attack by the Dark Storm Team emerged alongside rumors of FBI involvement. The platform’s history of seizures and the mysterious disappearance of its administrators have left the hacker community in uncertainty. Experts urge caution regarding the veracity of these claims, emphasizing the distrust prevalent in these clandestine online spaces.…
Read More
In Other News: 4chan Hacked, Android Auto-Reboot, Nemesis Admin Charged
Summary: SecurityWeek’s roundup highlights significant cybersecurity developments, including vulnerabilities in an enterprise printer solution, the impact of cyber breaches on stock prices, and NATO’s cyber exercise. The report also mentions the record number of Microsoft product vulnerabilities, a hack on 4chan, and a new auto-reboot feature for Android.…
Read More

Summary: The video discusses the insights from the annual IBM X-Force Threat Intelligence Index Report, highlighting the trends in cybersecurity, including the decline of ransomware and phishing attacks, an increase in credential theft, and evolving tactics among cybercriminals. The video concludes with recommendations on how to strengthen defenses against these threats and protect sensitive information.…
Read More
Hertz Data Breach – Customer Personal Information Stolen by Hackers
Summary: Hertz Corporation has confirmed a significant data breach that exposed sensitive customer information for its brands Hertz, Dollar, and Thrifty. Hackers exploited zero-day vulnerabilities in a vendor’s file transfer platform, leading to unauthorized access of personal data. The incident has prompted Hertz to take remedial actions, including providing identity protection services to affected customers.…
Read More
Fast Flux: The DNS Botnet Technique Alarming National Security Agencies
Fast flux is a malicious evasion technique that dynamically rotates DNS IP addresses to assist botnets in evading detection, posing a significant threat to national security. The NSA and CISA issued warnings regarding its alarming resurgence and effective use by cybercriminals and nation-state actors alike. Affected: national security, cybersecurity infrastructure, malware, phishing campaigns.…
Read More
Govtech giant Conduent confirms client data stolen in January cyberattack
Summary: Conduent, a major American business services firm, has confirmed that client data was stolen during a cyberattack in January 2025. The company is currently investigating the impact of the breach, which involved personal information of clients’ end-users. While there are no signs of the stolen data being publicly available, Conduent has incurred expenses related to the incident.…
Read More
Cybersecurity firm buying hacker forum accounts to spy on cybercriminals
Summary: Swiss cybersecurity firm Prodaft has initiated a program called ‘Sell your Source,’ aimed at acquiring verified accounts from hacking forums to enhance intelligence on cybercriminal activities. The initiative seeks to penetrate cybercrime networks while ensuring rigorous verification of account history and legality. Prodaft’s efforts are touted as a method to improve visibility and combat adversarial cyber threats effectively.…
Read More
Threat Actor Allegedly Selling Fortinet Firewall Zero-Day Exploit
Summary: Fortinet warns that threat actors are maintaining persistent access to FortiOS and FortiProxy devices due to known vulnerabilities, while a zero-day exploit for FortiGate firewalls is reportedly being sold on a dark web forum. This exploit could enable remote execution of arbitrary code without authentication, compromising sensitive configurations and data.…
Read More
Dark Web Profile: Babuk/Babuk2
Babuk, originally infamous for its ransomware attacks, has evolved into Babuk2 and introduced a hybrid model focusing on data theft and extortion. Despite claims of significant data breaches, doubts about its capabilities exist as many leaks appear recycled from previous incidents. Overall, Babuk2 exploits its reputation for profit while maintaining a focus on high-value targets.…
Read More
What They Didn’t Secure: SaaS Security Lessons from the World’s Biggest Breaches
This guide outlines a strategic security approach for Software-as-a-Service (SaaS) applications, focusing on five key pillars: Identity and Access Management (IAM), Data Protection, Secure Development, Network Security Controls, and Incident Response & Monitoring. It emphasizes the need for adopting Zero Trust principles and aligns each security pillar with established industry standards.…
Read More
This strategic estimate and countermeasure plan addresses the escalating threat posed by Chinese cyber operations targeting critical infrastructure, particularly in the U.S., Europe, and Asia-Pacific regions. It emphasizes the need for coordinated resilience across government and private sectors and highlights specific recommendations for fortifying defenses against cyber intrusions, including the development of offensive strategies and enhanced international collaboration.…
Read More
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more

General • Servers • Vulnerabilities • Exploits • Attack surface • Code • Email addresses • Domains • URLs • DNS • Certificates • WiFi networks • Device Info • Credentials • Leaks • Hidden Services • Social Networks • Phone numbers • Images • Threat Intelligence • Web History • Files • Surveillance cameras • Crypto • People

General Search EnginesGoogleBingYahoo!YandexAskBaiduSearXNGEXALeadDuckDuckGoSwisscowsNaverAOLBraveYepGibiruKagiStractServersShodan – Search Engine for the Internet of EverythingCensys Search – Search Engine for every server on the Internet to reduce exposure and improve securityOnyphe.io …
Read More
Western Sydney University discloses security breaches, data leak
Summary: Western Sydney University (WSU) has reported two significant security incidents that compromised personal information of its community members, affecting both current and former students. The breaches include a hack of its single sign-on (SSO) system and a leak of data on the dark web. Following repeated incidents, WSU’s leadership has apologized and committed to improving their cybersecurity measures.…
Read More