I have played maybe a hour of Subnautica 2 today and it's a solid game for anyone who wanted to know.
❤2
‼️ New Dark Web Informer Blog Post!
Title: CVE-2026-20182: Critical Cisco SD-WAN Auth Bypass Under Active Exploitation
Link: https://darkwebinformer.com/cve-2026-20182-critical-cisco-sd-wan-auth-bypass-under-active-exploitation/
Title: CVE-2026-20182: Critical Cisco SD-WAN Auth Bypass Under Active Exploitation
Link: https://darkwebinformer.com/cve-2026-20182-critical-cisco-sd-wan-auth-bypass-under-active-exploitation/
Dark Web Informer
CVE-2026-20182: Critical Cisco SD-WAN Auth Bypass Under Active Exploitation
Cisco has disclosed and patched CVE-2026-20182, a maximum-severity authentication bypass affecting Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager.
❤1
🚨 Nightmare Eclipse just released another vulnerability called MiniPlasma
GitHub: https://github.com/Nightmare-Eclipse/MiniPlasma
CVE: CVE-2020-17103 which is a high-severity elevation of privilege vulnerability in the Windows Cloud Files Mini Filter Driver that allows an attacker to gain elevated, unauthorized access to a targeted system
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
GitHub: https://github.com/Nightmare-Eclipse/MiniPlasma
CVE: CVE-2020-17103 which is a high-severity elevation of privilege vulnerability in the Windows Cloud Files Mini Filter Driver that allows an attacker to gain elevated, unauthorized access to a targeted system
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
❤1😭1
‼️🇻🇪 CANTV ABA Ultra allegedly breached: 7.5K subscriber records and 4K OLT/GPON network device records exposed from Venezuelan fiber broadband infrastructure
A threat actor claims to have compromised a UISP Ubiquiti administration panel linked to CANTV ABA Ultra, the fiber broadband service operated by Compañía Anónima Nacional Teléfonos de Venezuela (CANTV). The actor alleges the breach exposed personal subscriber data, financial records, and detailed GPON/OLT network device inventory information across Eastern Venezuela.
▸ Actor: GordonFreeman
▸ Sector: Telecommunications / Fiber Broadband / GPON Infrastructure
▸ Type: Data Breach
▸ Records: 7,500 subscriber records and 4,000 network device records
▸ Country: Venezuela
▸ Date: 14/05/2026
Compromised data:
▪️ Subscriber records allegedly including customer names, emails, phone numbers, addresses, user IDs, registration dates, customer type, service plans, pricing, account status, and banking-related fields
▪️ CANTV ABA Ultra fiber broadband customer data tied to residential service deployments in Eastern Venezuela
▪️ ONT/customer equipment references including MAC ONT values, plan details, service status, and geographic coordinates
▪️ OLT/GPON network device records allegedly including MAC addresses, hostnames, serial numbers, firmware versions, bridge versions, device models, vendor details, and platform identifiers
▪️ Network topology metadata including site IDs, parent relationships, device roles, uplink devices, interface references, authorization status, and operational state
▪️ Infrastructure monitoring data including CPU, RAM, signal levels, uptime, service time, outage scores, voltage, power status, temperature, battery capacity, and maintenance flags
▪️ Location-related infrastructure records allegedly including latitude, longitude, elevation, heading, and node placement metadata
The actor claims the exposed data maps thousands of CANTV ABA Ultra subscribers and GPON/OLT infrastructure assets across the affected region.
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have compromised a UISP Ubiquiti administration panel linked to CANTV ABA Ultra, the fiber broadband service operated by Compañía Anónima Nacional Teléfonos de Venezuela (CANTV). The actor alleges the breach exposed personal subscriber data, financial records, and detailed GPON/OLT network device inventory information across Eastern Venezuela.
▸ Actor: GordonFreeman
▸ Sector: Telecommunications / Fiber Broadband / GPON Infrastructure
▸ Type: Data Breach
▸ Records: 7,500 subscriber records and 4,000 network device records
▸ Country: Venezuela
▸ Date: 14/05/2026
Compromised data:
▪️ Subscriber records allegedly including customer names, emails, phone numbers, addresses, user IDs, registration dates, customer type, service plans, pricing, account status, and banking-related fields
▪️ CANTV ABA Ultra fiber broadband customer data tied to residential service deployments in Eastern Venezuela
▪️ ONT/customer equipment references including MAC ONT values, plan details, service status, and geographic coordinates
▪️ OLT/GPON network device records allegedly including MAC addresses, hostnames, serial numbers, firmware versions, bridge versions, device models, vendor details, and platform identifiers
▪️ Network topology metadata including site IDs, parent relationships, device roles, uplink devices, interface references, authorization status, and operational state
▪️ Infrastructure monitoring data including CPU, RAM, signal levels, uptime, service time, outage scores, voltage, power status, temperature, battery capacity, and maintenance flags
▪️ Location-related infrastructure records allegedly including latitude, longitude, elevation, heading, and node placement metadata
The actor claims the exposed data maps thousands of CANTV ABA Ultra subscribers and GPON/OLT infrastructure assets across the affected region.
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️ A Scam Tools dataset allegedly leaked: 1.2K user records exposed from a scam-tool platform database
A threat actor claims to have leaked an old dataset associated with scam-tool infrastructure, allegedly exposing user records and account activity data from a platform used for fraudulent tooling. The actor alleges the database contains user profile entries, activity timestamps, message counts, and usernames.
▸ Actor: explode
▸ Sector: Cybercrime Infrastructure / Scam Tools
▸ Type: Database Leak
▸ Records: 1,235 user records
▸ Country: Unknown / Global
Compromised data:
▪️ User account records from an alleged scam-tool database
▪️ Usernames and profile-related identifiers
▪️ Account activity timestamps including last-seen data
▪️ Message count metadata linked to user profiles
▪️ Export metadata showing when the dataset was generated
▪️ Database sample records shared publicly as proof of access
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked an old dataset associated with scam-tool infrastructure, allegedly exposing user records and account activity data from a platform used for fraudulent tooling. The actor alleges the database contains user profile entries, activity timestamps, message counts, and usernames.
▸ Actor: explode
▸ Sector: Cybercrime Infrastructure / Scam Tools
▸ Type: Database Leak
▸ Records: 1,235 user records
▸ Country: Unknown / Global
Compromised data:
▪️ User account records from an alleged scam-tool database
▪️ Usernames and profile-related identifiers
▪️ Account activity timestamps including last-seen data
▪️ Message count metadata linked to user profiles
▪️ Export metadata showing when the dataset was generated
▪️ Database sample records shared publicly as proof of access
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️🇺🇸⚡️ Lightning AI allegedly breached: internal codebase and project files exposed from the creators of PyTorch Lightning
A threat actor claims to have leaked internal data belonging to Lightning AI, the company behind PyTorch Lightning. The actor alleges the exposed material includes internal repositories, application code, private project directories, development resources, and additional files tied to Lightning AI’s engineering environment.
▸ Actor: diencracked
▸ Sector: Artificial Intelligence / Software Development
▸ Type: Data Leak
▸ Records: 1,360 directories and 10,239 files
▸ Country: United States
▸ Date: 14/05/2026
Compromised data:
▪️ Internal source code and repository directories allegedly linked to Lightning AI projects
▪️ Private application and platform code related to Lightning AI services
▪️ Development resources including plugins, templates, extensions, benchmarks, and deployment materials
▪️ Internal project folders referencing CI/CD, customer issue tracking, cloud workflows, and engineering tooling
▪️ Archived data samples showing directory listings and file counts
▪️ Additional hidden data allegedly shared through restricted forum content
The actor references a prior PyPI credential compromise involving PyTorch Lightning and claims the leaked material includes internal codebase files and extra data obtained from Lightning AI systems.
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked internal data belonging to Lightning AI, the company behind PyTorch Lightning. The actor alleges the exposed material includes internal repositories, application code, private project directories, development resources, and additional files tied to Lightning AI’s engineering environment.
▸ Actor: diencracked
▸ Sector: Artificial Intelligence / Software Development
▸ Type: Data Leak
▸ Records: 1,360 directories and 10,239 files
▸ Country: United States
▸ Date: 14/05/2026
Compromised data:
▪️ Internal source code and repository directories allegedly linked to Lightning AI projects
▪️ Private application and platform code related to Lightning AI services
▪️ Development resources including plugins, templates, extensions, benchmarks, and deployment materials
▪️ Internal project folders referencing CI/CD, customer issue tracking, cloud workflows, and engineering tooling
▪️ Archived data samples showing directory listings and file counts
▪️ Additional hidden data allegedly shared through restricted forum content
The actor references a prior PyPI credential compromise involving PyTorch Lightning and claims the leaked material includes internal codebase files and extra data obtained from Lightning AI systems.
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️ New Dark Web Informer Blog Post!
Title: Daily Dose of Dark Web Informer - May 14th, 2026
Link: https://darkwebinformer.com/daily-dose-of-dark-web-informer-may-14th-2026/
Title: Daily Dose of Dark Web Informer - May 14th, 2026
Link: https://darkwebinformer.com/daily-dose-of-dark-web-informer-may-14th-2026/
Dark Web Informer
Daily Dose of Dark Web Informer - May 14th, 2026
This daily article is intended to make it easier for those who want to stay updated with my regular Dark Web Informer and X/Twitter posts.
Chat, just a reminder to join the backup channel. Save yourself time looking for the new channel incase this one goes. https://t.me/SliceForLifeeee
Telegram
🔪 Slice For Life - Part 3 🔪
Main: t.me/SliceForLifeee
Website: darkwebinformer.com
Website Pricing (Includes Crypto): darkwebinformer.com/pricing
Socials: darkwebinformer.com/socials
API Access: https://darkwebinformer.com/api-details
Donate: darkwebinformer.com/donations
Website: darkwebinformer.com
Website Pricing (Includes Crypto): darkwebinformer.com/pricing
Socials: darkwebinformer.com/socials
API Access: https://darkwebinformer.com/api-details
Donate: darkwebinformer.com/donations
❤1
Cyberattack News Alert
━━━━━━━━━━━━━━━━━━━━━━━━━
Victim: 株式会社オリエンタルダイヤモンド
Domain:
Country: 🇯🇵 JP
Date: May 12th, 2026
Claimed by: Thegentlemen ransomware gang
Summary:
Oriental Diamond announced that on May 4, 2026, it fell victim to a ransomware cyberattack carried out by a third party, which resulted in the encryption of data on its internal servers and a risk of personal data leakage. The company immediately isolated its servers from the network, reported the incident to the police and the Personal Data Protection Commission, and launched an investigation as well as restoration work entrusted to external experts. It stated that it would henceforth strive to prevent any recurrence and restore trust by implementing measures such as suspending VPN usage and strengthening authentication procedures.
Source: https://www.orientaldiamond.jp/お知らせ
━━━━━━━━━━━━━━━━━━━━━━━━━
Victim: 株式会社オリエンタルダイヤモンド
Domain:
orientaldiamond.jpCountry: 🇯🇵 JP
Date: May 12th, 2026
Claimed by: Thegentlemen ransomware gang
Summary:
Oriental Diamond announced that on May 4, 2026, it fell victim to a ransomware cyberattack carried out by a third party, which resulted in the encryption of data on its internal servers and a risk of personal data leakage. The company immediately isolated its servers from the network, reported the incident to the police and the Personal Data Protection Commission, and launched an investigation as well as restoration work entrusted to external experts. It stated that it would henceforth strive to prevent any recurrence and restore trust by implementing measures such as suspending VPN usage and strengthening authentication procedures.
Source: https://www.orientaldiamond.jp/お知らせ
‼️🇺🇸 Eli Lilly allegedly breached: 1.2K internal repositories and 40GB of Veeva Vault documents exposed from drug development and clinical trial systems up for sale for $70K
A threat actor claims to have obtained internal codebases belonging to Eli Lilly and Company, the global pharmaceutical manufacturer. The actor alleges the exposed material includes repositories and documents tied to drug development, clinical trials, patient enrollment, medical devices, manufacturing systems, computational biology, and internal AI tooling.
▸ Actor: TeamPCP
▸ Sector: Pharmaceuticals / Biotechnology / Healthcare
▸ Type: Data Breach
▸ Records: 1,200+ repositories and 40GB of documents
▸ Country: United States
▸ Date: 14/05/2026
Compromised data:
▪️ Internal code repositories allegedly linked to Eli Lilly platforms and development environments
▪️ Drug research tools, clinical trial programs, and computational biology codebases
▪️ Internal AI agent projects and software development kit implementations
▪️ Medical device, manufacturing system, and clinical monitoring-related code
▪️ Patient enrollment and trial operations project files
▪️ Veeva Vault documents allegedly totaling approximately 40GB
▪️ DevOps and infrastructure-related project references across company systems
The actor claims the exposed material includes more than 80GB of compressed code across 1.2K+ repositories, along with documents allegedly stolen from the company’s Veeva Vault environment.
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have obtained internal codebases belonging to Eli Lilly and Company, the global pharmaceutical manufacturer. The actor alleges the exposed material includes repositories and documents tied to drug development, clinical trials, patient enrollment, medical devices, manufacturing systems, computational biology, and internal AI tooling.
▸ Actor: TeamPCP
▸ Sector: Pharmaceuticals / Biotechnology / Healthcare
▸ Type: Data Breach
▸ Records: 1,200+ repositories and 40GB of documents
▸ Country: United States
▸ Date: 14/05/2026
Compromised data:
▪️ Internal code repositories allegedly linked to Eli Lilly platforms and development environments
▪️ Drug research tools, clinical trial programs, and computational biology codebases
▪️ Internal AI agent projects and software development kit implementations
▪️ Medical device, manufacturing system, and clinical monitoring-related code
▪️ Patient enrollment and trial operations project files
▪️ Veeva Vault documents allegedly totaling approximately 40GB
▪️ DevOps and infrastructure-related project references across company systems
The actor claims the exposed material includes more than 80GB of compressed code across 1.2K+ repositories, along with documents allegedly stolen from the company’s Veeva Vault environment.
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️🇪🇸 CA Indosuez Wealth Management allegedly breached: 200K lines of account holder PII exposed from Spanish financial records
A threat actor claims to have leaked data linked to CA Indosuez Wealth Management, the global wealth management brand of Crédit Agricole. The actor alleges the exposed dataset contains approximately 200,000 lines of account holder personal information from Spain, shared in text format with sample records posted as proof.
▸ Actor: Tink3rTech
▸ Sector: Banking / Wealth Management / Financial Services
▸ Type: Data Leak
▸ Records: 200,000 lines
▸ Country: Spain
▸ Date: 14/05/2026
Compromised data:
▪️ Account holder personally identifiable information allegedly linked to a Spanish financial group
▪️ Customer contact records including phone numbers and email addresses
▪️ Personal profile data including names, gender, and dates of birth
▪️ Residential address information including cities, postal codes, and regions
▪️ Text-formatted customer records allegedly extracted from financial datasets
▪️ Sample entries shared publicly as proof of access
The actor claims the dataset contains approximately 200,000 lines of Spanish account holder PII and is being marketed through underground channels.
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to have leaked data linked to CA Indosuez Wealth Management, the global wealth management brand of Crédit Agricole. The actor alleges the exposed dataset contains approximately 200,000 lines of account holder personal information from Spain, shared in text format with sample records posted as proof.
▸ Actor: Tink3rTech
▸ Sector: Banking / Wealth Management / Financial Services
▸ Type: Data Leak
▸ Records: 200,000 lines
▸ Country: Spain
▸ Date: 14/05/2026
Compromised data:
▪️ Account holder personally identifiable information allegedly linked to a Spanish financial group
▪️ Customer contact records including phone numbers and email addresses
▪️ Personal profile data including names, gender, and dates of birth
▪️ Residential address information including cities, postal codes, and regions
▪️ Text-formatted customer records allegedly extracted from financial datasets
▪️ Sample entries shared publicly as proof of access
The actor claims the dataset contains approximately 200,000 lines of Spanish account holder PII and is being marketed through underground channels.
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
❤1
‼️🇨🇦 Aviso Wealth allegedly breached: 261K customer records exposed from Canadian wealth management and financial services data
A threat actor claims to be selling data linked to Aviso Wealth, a Canadian wealth management and financial services company that provides services for banks, credit unions, and financial advisors. The actor alleges the exposed dataset contains customer contact and address records, with approximately 261,382 total lines.
▸ Actor: lowiqq
▸ Sector: Wealth Management / Financial Services
▸ Type: Data Leak
▸ Records: 261,382 lines
▸ Country: Canada
▸ Date: 01/05/2026
Compromised data:
▪️ Customer records allegedly linked to Aviso Wealth
▪️ Usernames or customer name fields
▪️ Residential address information
▪️ City and province data
▪️ Postal code records
▪️ Phone number fields tied to customer profiles
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
A threat actor claims to be selling data linked to Aviso Wealth, a Canadian wealth management and financial services company that provides services for banks, credit unions, and financial advisors. The actor alleges the exposed dataset contains customer contact and address records, with approximately 261,382 total lines.
▸ Actor: lowiqq
▸ Sector: Wealth Management / Financial Services
▸ Type: Data Leak
▸ Records: 261,382 lines
▸ Country: Canada
▸ Date: 01/05/2026
Compromised data:
▪️ Customer records allegedly linked to Aviso Wealth
▪️ Usernames or customer name fields
▪️ Residential address information
▪️ City and province data
▪️ Postal code records
▪️ Phone number fields tied to customer profiles
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations