🔪 Slice For Life 🔪
3.42K subscribers
860 photos
3 videos
706 links
Download Telegram
‼️ A threat actor is distributing a combolist containing 9 million TikTok credentials.
‼️ Genesis Ransomware claims 8 victims.

🇺🇸 Secure Health
🇺🇸 Modern Advanced Print Solutions (MAPS, Inc.)
🇺🇸 MC-Rx
🇺🇸 HMI Elements
🇺🇸 Green Giftz
🇺🇸 Raphael Ortho
🇺🇸 B&R Sheet Metal
🇺🇸 Catalyst Learning Company
‼️🇩🇪 A dataset allegedly containing 10.5 million users from LSGB, a defunct German gaming and leak forum, has been leaked on a popular cybercrime forum.

▪️ Records: 10,500,000 (10M + 500K new)
▪️ Size: 121 MB (compressed)
▪️ Data Fields: User ID, username, email address, password hash (bcrypt), salt, user group, registration date, last visit, registration IP, last IP, post count, reputation, PM count, signature, birthday, location, website
Cyberattack News Alert
━━━━━━━━━━━━━━━━━━━━━━━━━

Victim: Charité
Domain: charite.de

Country: 🇩🇪 DE
Date: Mar 31st, 2026

Summary:
Un dysfonctionnement technique au sein d'un centre de données de la Charité à Berlin a entraîné une panne informatique affectant trois sites hospitaliers, empêchant la Feuerwehr d'accéder aux cliniques Virchow, Mitte et Steglitz. Bien que la fourniture de soins aux patients reste stable, les services d'urgence ont temporairement désactivé les entrées des urgences centrales par mesure de sécurité, tout en excluant toute hypothèse de cyberattaque. La Charité travaille activement à la résolution de ce problème technique, qui survient dans un contexte de vigilance accrue face aux risques de cybersécurité pour les institutions publiques berlinoises.

Source: https://www.tagesspiegel.de/berlin/itausfall-an-der-berliner-charite-feuerwehr-kann-drei-klinikstandorte-nicht-anfahren-15421749.html
Cyberattack News Alert
━━━━━━━━━━━━━━━━━━━━━━━━━

Victim: Häpo-Reifencenter
Domain: haepo.ch

Country: 🇨🇭 CH
Date: Mar 29th, 2026

Summary:
Le dimanche 29 mars 2026, le groupe de pirates informatiques Pay2Key, lié à l'Iran, a chiffré et paralysé le système informatique de l'entreprise Häpo-Reifencenter, située à Winterthour, à l'aide d'un ransomware. Bien que l'entreprise disposât de sauvegardes, celles-ci ont également été détruites, ce qui entraîne un préjudice quotidien de plusieurs dizaines de milliers de francs et une perte des données comptables actuelles. Häpo a informé la police et alerté son assureur, tandis que la direction n'envisage pour l'instant pas de payer la rançon exigée.

Source: https://www.tagesanzeiger.ch/cyberangriff-in-winterthur-hacker-legen-haepo-reifencenter-lahm-229421108182
💥 Early stages of a Cybercrime Website Leaderboard is now available to Elite subscribers.

A separate Threat Actor Leaderboard is being worked on, but nothing to show for it for now.

https://darkwebinformer.com/cybercrime-website-leaderboard4574474574/
😭1
‼️🇺🇸 A massive breach allegedly from BlackLine, a major financial automation platform, is being sold on a popular cybercrime forum.

▪️ Documents: ~1,532,718
▪️ Total Size: 354.4 GB
▪️ Data Includes: Bills, licenses, certificates, and other documents processed for high-profile clients
▪️ Client Noted: FedEx PO APAC Production
‼️🇺🇸 A threat actor claims to possess a dataset containing personal and financial information of 1 million Coinbase users, including names, emails, phone numbers, account balances, and cryptocurrency holdings.
😭1
‼️🇺🇸 A dataset allegedly containing 9,000+ loan records from HeritageSouth Credit Union (USA) has been leaked on a popular cybercrime forum.

▪️ Records: 9,000+
▪️ Size: ~5.5 MB (CSV)
▪️ Data Fields: Loan ID, borrower ID, SSN, full name, gender, birthdate, address, ZIP code, credit score, loan amount, interest rate, delinquency counts, charge-off details, co-borrower info (SSN, name, address), collateral vehicle details (make, model, year, VIN, value)
How many daily alerts on the threat feed is enough for you or would be enough for you if you subscribed?
Anonymous Poll
19%
0-400
3%
401-800
3%
801-1200
36%
Unlimited
39%
Show Results
‼️313 Team claims to have kicked the website Kick offline.

Currently showing online.
‼️🇺🇸 A database (V2) allegedly from Success.com, a popular newsletter and article platform, has been leaked on a popular cybercrime forum.

This is the second breach, the site was still vulnerable, with over 60K new emails added since the first leak.

▪️ Records: 207,000+ unique users
▪️ Data Fields: Email, first/last name, phone, company, passwords, billing & shipping addresses, payment method, social media links (Facebook, LinkedIn, Twitter), job title, credit scores, order history, store orders, and more

Note: The threat actor states Success.com did not respond to contact or consider meeting their demands