This “dream wish list for criminals” includes millions of Gmail, Facebook, banking logins, and more. The researcher who ...
A publicly accessible database containing more than 149 million usernames and passwords was discovered, and before it was ...
Modern ransomware has shifted from encryption to psychological extortion that exploits fear, liability, and exposure. Flare shows how today's ransomware groups weaponize stolen data and pressure ...
A cyberattack targeting Poland's power grid in late December 2025 has been linked to the Russian state-sponsored hacking ...
What it discovered were stolen datasets belonging to 12 unnamed and unconnected firms hit in separate INC ransomware attacks.
Cybersecurity firm LayerX uncovers 17 malicious extensions that can enable click fraud, user tracking, and more. The most ...
A security researcher uncovered an exposed online database that was stockpiling user information likely collected via malware ...
A security researcher has discovered 149 million stolen login credentials in an unprotected database, including 900,000 ...
Pull requests help you collaborate on code with other people. As pull requests are created, they’ll appear here in a searchable and filterable list. To get started, you should create a pull request.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results