I am testing STIX format for API only endpoints. There will be one for the threat feed, ransomware feed and IOC feed. This won't be available on the frontend platform, only for API customers.
I will update when I am close to a date, but I want to say the very end of the month.
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
I will update when I am close to a date, but I want to say the very end of the month.
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Telegram
🔪 Slice For Life - Part 2 🔪
Backup: t.me/SliceForLifeeee
Website: darkwebinformer.com
Website Pricing (Includes Crypto): darkwebinformer.com/pricing
Socials: darkwebinformer.com/socials
API Access: https://darkwebinformer.com/api-details
Donate: darkwebinformer.com/donations
Website: darkwebinformer.com
Website Pricing (Includes Crypto): darkwebinformer.com/pricing
Socials: darkwebinformer.com/socials
API Access: https://darkwebinformer.com/api-details
Donate: darkwebinformer.com/donations
❤2
🚨 Looks like this could be the end of Hasan at Breached, as well as VECT being removed as staff diencracked takes further control of the forum...
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
🔥2
🚨🇺🇸 Crust Pizza Co. | Alleged Customer Database Sale
Crust Pizza Co. has been named in a forum sale listing involving an alleged customer database exposure.
The actor claims the dataset includes over 523K customer records, including contact details and account-related fields.
[ Details ]
𝗧𝗮𝗿𝗴𝗲𝘁: Crust Pizza Co.
𝗟𝗼𝗰𝗮𝘁𝗶𝗼𝗻: United States
𝗖𝗮𝘁𝗲𝗴𝗼𝗿𝘆: Food & Beverage / Restaurant
𝗔𝗰𝘁𝗼𝗿: Sorb
𝗖𝗹𝗮𝗶𝗺: Customer database sale
𝗘𝘅𝗽𝗼𝘀𝘂𝗿𝗲: 523K customer records
𝗣𝗿𝗶𝗰𝗲: $500
𝗢𝗯𝘀𝗲𝗿𝘃𝗲𝗱: 20/05/2026
[ Claimed Data ]
• Full names
• Email address fields
• Phone number fields
• Account number fields
• Customer ID and store ID fields
• Address, city, state, and ZIP code fields
• CSV-formatted customer database records
[ Verification ]
Unverified underground forum claim. The actor posted a CSV sample and claims the full database is available for sale through escrow.
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Crust Pizza Co. has been named in a forum sale listing involving an alleged customer database exposure.
The actor claims the dataset includes over 523K customer records, including contact details and account-related fields.
[ Details ]
𝗧𝗮𝗿𝗴𝗲𝘁: Crust Pizza Co.
𝗟𝗼𝗰𝗮𝘁𝗶𝗼𝗻: United States
𝗖𝗮𝘁𝗲𝗴𝗼𝗿𝘆: Food & Beverage / Restaurant
𝗔𝗰𝘁𝗼𝗿: Sorb
𝗖𝗹𝗮𝗶𝗺: Customer database sale
𝗘𝘅𝗽𝗼𝘀𝘂𝗿𝗲: 523K customer records
𝗣𝗿𝗶𝗰𝗲: $500
𝗢𝗯𝘀𝗲𝗿𝘃𝗲𝗱: 20/05/2026
[ Claimed Data ]
• Full names
• Email address fields
• Phone number fields
• Account number fields
• Customer ID and store ID fields
• Address, city, state, and ZIP code fields
• CSV-formatted customer database records
[ Verification ]
Unverified underground forum claim. The actor posted a CSV sample and claims the full database is available for sale through escrow.
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
‼️ New Dark Web Informer Blog Post!
Title: Perumda Tirta Musi Palembang Alleged Customer Database Sale: 437K+ Utility Records Advertised
Link: https://darkwebinformer.com/perumda-tirta-musi-palembang-alleged-customer-database-sale-437k-utility-records-advertised/
Title: Perumda Tirta Musi Palembang Alleged Customer Database Sale: 437K+ Utility Records Advertised
Link: https://darkwebinformer.com/perumda-tirta-musi-palembang-alleged-customer-database-sale-437k-utility-records-advertised/
Dark Web Informer
Perumda Tirta Musi Palembang Alleged Customer Database Sale: 437K+ Utility Records Advertised
Perumda Tirta Musi Palembang has been named in a forum sale listing involving an alleged water utility customer database exposure.
RetoSwap has been drained of 7,000 XMR ($2.7 Million) after a flaw in the Haveno protocol.
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
❤2
🇪🇺 Europol Press Release
━━━━━━━━━━━━━━━━━━━━━
Cybercriminal VPN used by ransomware actors dismantled in global crackdown
Full Press Release → europol.europa.eu
━━━━━━━━━━━━━━━━━━━━━
🕵️ Dark Web Informer • Europol Monitor
Note: Europol articles that are not Cyber related will be removed manually.
━━━━━━━━━━━━━━━━━━━━━
Cybercriminal VPN used by ransomware actors dismantled in global crackdown
Full Press Release → europol.europa.eu
━━━━━━━━━━━━━━━━━━━━━
🕵️ Dark Web Informer • Europol Monitor
Note: Europol articles that are not Cyber related will be removed manually.
Europol
Cybercriminal VPN used by ransomware actors dismantled in global crackdown – VPN service featured in almost every major Europol…
A VPN service used by cybercriminals to conceal ransomware attacks, data theft, and other serious offences has been dismantled in an international operation led by France and the Netherlands, with support from Europol and Eurojust.
Cyberattack News Alert
━━━━━━━━━━━━━━━━━━━━━━━━━
Victim: Kinsmen Foundation
Domain:
Country: 🇨🇦 CA
Date: May 19th, 2026
Claimed by: Pear ransomware gang
Summary:
Contact information and email addresses were potentially compromised in a cybersecurity incident at Kinsmen Foundation. Although unauthorized access was gained to certain applications, regular operations and services were not affected. Law enforcement authorities were notified and third-party experts were engaged. The organization is currently contacting its donors whose information may have been compromised and is urging the public to remain vigilant against suspicious emails.
Source: https://www.cjwwradio.com/2026/05/20/kinsmen-foundation-suffers-cyber-incident-donor-data-at-risk/
━━━━━━━━━━━━━━━━━━━━━━━━━
Victim: Kinsmen Foundation
Domain:
telemiracle.comCountry: 🇨🇦 CA
Date: May 19th, 2026
Claimed by: Pear ransomware gang
Summary:
Contact information and email addresses were potentially compromised in a cybersecurity incident at Kinsmen Foundation. Although unauthorized access was gained to certain applications, regular operations and services were not affected. Law enforcement authorities were notified and third-party experts were engaged. The organization is currently contacting its donors whose information may have been compromised and is urging the public to remain vigilant against suspicious emails.
Source: https://www.cjwwradio.com/2026/05/20/kinsmen-foundation-suffers-cyber-incident-donor-data-at-risk/
Country 600 CJWW
Kinsmen Foundation suffers cyber incident, donor data at risk
Contact information and email addresses were potentially compromised during a Kinsmen Foundation cyber inciden...
🚨🇨🇦 Happipad | Alleged Customer Database Exposure
Happipad has been named in a forum leak post involving an alleged customer database exposure.
The actor claims the dataset includes 12,178 CSV records tied to Happipad, a Canadian social enterprise focused on shared housing and affordable housing support.
[ Details ]
𝗧𝗮𝗿𝗴𝗲𝘁: Happipad
𝗟𝗼𝗰𝗮𝘁𝗶𝗼𝗻: Canada
𝗖𝗮𝘁𝗲𝗴𝗼𝗿𝘆: Housing / Social Enterprise / Customer Data
𝗔𝗰𝘁𝗼𝗿: zSenior
𝗖𝗹𝗮𝗶𝗺: Customer database leak
𝗘𝘅𝗽𝗼𝘀𝘂𝗿𝗲: 12,178 CSV records
𝗣𝗿𝗶𝗰𝗲: Not stated
𝗢𝗯𝘀𝗲𝗿𝘃𝗲𝗱: 20/05/2026
[ Claimed Data ]
• Names and email addresses
• Phone number fields
• Profile status and client name fields
• Province, city, country, and postal code fields
• Registration and verification status data
• Gender and self-description fields
• Housing preference and live-with preference data
• Schedule, noise tolerance, accessibility, cleaning, cooking, and visit frequency fields
[ Verification ]
Unverified underground forum claim. The actor posted a CSV sample and claims a 5K-record partial leak is available through hidden forum content.
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Happipad has been named in a forum leak post involving an alleged customer database exposure.
The actor claims the dataset includes 12,178 CSV records tied to Happipad, a Canadian social enterprise focused on shared housing and affordable housing support.
[ Details ]
𝗧𝗮𝗿𝗴𝗲𝘁: Happipad
𝗟𝗼𝗰𝗮𝘁𝗶𝗼𝗻: Canada
𝗖𝗮𝘁𝗲𝗴𝗼𝗿𝘆: Housing / Social Enterprise / Customer Data
𝗔𝗰𝘁𝗼𝗿: zSenior
𝗖𝗹𝗮𝗶𝗺: Customer database leak
𝗘𝘅𝗽𝗼𝘀𝘂𝗿𝗲: 12,178 CSV records
𝗣𝗿𝗶𝗰𝗲: Not stated
𝗢𝗯𝘀𝗲𝗿𝘃𝗲𝗱: 20/05/2026
[ Claimed Data ]
• Names and email addresses
• Phone number fields
• Profile status and client name fields
• Province, city, country, and postal code fields
• Registration and verification status data
• Gender and self-description fields
• Housing preference and live-with preference data
• Schedule, noise tolerance, accessibility, cleaning, cooking, and visit frequency fields
[ Verification ]
Unverified underground forum claim. The actor posted a CSV sample and claims a 5K-record partial leak is available through hidden forum content.
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
💡CVE Lite CLI: Vulnerability scanning that belongs in your terminal, not your CI pipeline. Scan your lockfile, get copy-and-run fix commands, and ship clean code.
GitHub: https://github.com/OWASP/cve-lite-cli
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
GitHub: https://github.com/OWASP/cve-lite-cli
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
🚨🇰🇼 Kuwait Central Statistical Bureau | Alleged Citizen Database Leak
Kuwait Central Statistical Bureau has been named in a forum leak post involving an alleged citizen database exposure.
The actor claims the dataset contains information on 1M Kuwaiti citizens aged 18+, including household head records and national identity fields.
[ Details ]
𝗧𝗮𝗿𝗴𝗲𝘁: Kuwait Central Statistical Bureau
𝗟𝗼𝗰𝗮𝘁𝗶𝗼𝗻: Kuwait
𝗖𝗮𝘁𝗲𝗴𝗼𝗿𝘆: Government / Citizen Records
𝗔𝗰𝘁𝗼𝗿: 0cx00iq
𝗖𝗹𝗮𝗶𝗺: Citizen database leak
𝗘𝘅𝗽𝗼𝘀𝘂𝗿𝗲: 1M citizen records
𝗣𝗿𝗶𝗰𝗲: Free
𝗢𝗯𝘀𝗲𝗿𝘃𝗲𝗱: 20/05/2026
[ Claimed Data ]
• Citizen names
• Family names and surnames
• National ID number fields
• Household head records
• Records for Kuwaiti citizens aged 18+
• Data allegedly sourced from a government statistics server
[ Verification ]
Unverified underground forum claim. The actor posted bilingual English and Arabic details.
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
Kuwait Central Statistical Bureau has been named in a forum leak post involving an alleged citizen database exposure.
The actor claims the dataset contains information on 1M Kuwaiti citizens aged 18+, including household head records and national identity fields.
[ Details ]
𝗧𝗮𝗿𝗴𝗲𝘁: Kuwait Central Statistical Bureau
𝗟𝗼𝗰𝗮𝘁𝗶𝗼𝗻: Kuwait
𝗖𝗮𝘁𝗲𝗴𝗼𝗿𝘆: Government / Citizen Records
𝗔𝗰𝘁𝗼𝗿: 0cx00iq
𝗖𝗹𝗮𝗶𝗺: Citizen database leak
𝗘𝘅𝗽𝗼𝘀𝘂𝗿𝗲: 1M citizen records
𝗣𝗿𝗶𝗰𝗲: Free
𝗢𝗯𝘀𝗲𝗿𝘃𝗲𝗱: 20/05/2026
[ Claimed Data ]
• Citizen names
• Family names and surnames
• National ID number fields
• Household head records
• Records for Kuwaiti citizens aged 18+
• Data allegedly sourced from a government statistics server
[ Verification ]
Unverified underground forum claim. The actor posted bilingual English and Arabic details.
Stop guessing what's redacted. Subscribers see everything → darkwebinformer.com/pricing
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
❤1🔥1😈1
‼️CVE-2026-0300: PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID Authentication Portal
CVSS 9.3
PoC: https://github.com/p3Nt3st3r-sTAr/CVE-2026-0300-POC
FOFA Query: app="Palo-Alto-pan-os"
FOFA Link: https://en.fofa.info/result?qbase64=YXBwPSJQYWxvLUFsdG8tcGFuLW9zIg==
Results: 32,070
Blog Post: https://www.rapid7.com/blog/post/etr-critical-buffer-overflow-in-palo-alto-networks-pan-os-user-id-authentication-portal-cve-2026-0300/
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations
CVSS 9.3
PoC: https://github.com/p3Nt3st3r-sTAr/CVE-2026-0300-POC
FOFA Query: app="Palo-Alto-pan-os"
FOFA Link: https://en.fofa.info/result?qbase64=YXBwPSJQYWxvLUFsdG8tcGFuLW9zIg==
Results: 32,070
Blog Post: https://www.rapid7.com/blog/post/etr-critical-buffer-overflow-in-palo-alto-networks-pan-os-user-id-authentication-portal-cve-2026-0300/
________________________________________
Main Channel: https://t.me/SliceForLifeee
Backup Channel: https://t.me/SliceForLifeeee
Website: darkwebinformer.com
Pricing (Includes Crypto): darkwebinformer.com/pricing
API Access: darkwebinformer.com/api-details
Socials: darkwebinformer.com/socials
Donations: darkwebinformer.com/donations