"I love Microsoft Window's, I just wish it collected MORE of my personal data!" β Nobody, ever
π₯°106π―49π€12π₯9π7β€1π1π’1π€£1π1
Media is too big
VIEW IN TELEGRAM
A video was shared online today of a person named "Dave" being violently assaulted for their cryptocurrency. This is a continuing trend of violent crime associated with cryptocurrency.
π’173π€£55π€―19π±14π€9π₯°4π«‘4β€1π₯1π1π1
vx-underground
A video was shared online today of a person named "Dave" being violently assaulted for their cryptocurrency. This is a continuing trend of violent crime associated with cryptocurrency.
A person has identified the location of the video. This is Banbury Park in North York, Ontario, Canada.
π€£146π27π«‘24π’10β€6π€5π2π₯1π1
hacker tip: you can fit a lot of mayonnaise in a desktop case
π54π€11π€8π’6π₯°2π€2β€1
turns out that oracle compromise was real. wtf why would a multi billion dollar company lie ???
π88π€£27π€―8π€3π1π’1π€1
vx-underground
turns out that oracle compromise was real. wtf why would a multi billion dollar company lie ???
>oracle says nah we werent compromised
>ta says "wtf ya u were"
>bleepincomputer is given samples
>oracle healthcare customers confirm data is real
>oracle says "nah lol"
how does data magically appear then lol
https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/
>ta says "wtf ya u were"
>bleepincomputer is given samples
>oracle healthcare customers confirm data is real
>oracle says "nah lol"
how does data magically appear then lol
https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/
BleepingComputer
Oracle Health breach compromises patient data at US hospitals
A breach at Oracle Health impacts multiple US healthcare organizations and hospitals after a threat actor stole patient data from legacy servers.
π57π€£31π€6β€4π4π₯1π1
vx-underground
>oracle says nah we werent compromised >ta says "wtf ya u were" >bleepincomputer is given samples >oracle healthcare customers confirm data is real >oracle says "nah lol" how does data magically appear then lol https://www.bleepingcomputer.com/news/security/oracleβ¦
oracle WAS NOT hacked! a criminal just happened to PERFECTLY guess customer data and it BY CHANCE perfectly matched the data of healthcare customers!!!
π€£155π€―16π6β€4π4π₯3β€βπ₯2π2π2π1π―1
vx-underground
oracle WAS NOT hacked! a criminal just happened to PERFECTLY guess customer data and it BY CHANCE perfectly matched the data of healthcare customers!!!
ORACLE WAS NOT COMPROMISED! oracle intentionally inserted a weird txt file into there website with a criminals email address!!!!
π151π€£64β€8π2π₯2π±2π«‘2π’1π1
vx-underground
π¨BREAKINGπ¨ IShowSpeed will be performing a A BACKFLIP over the Great Firewall of China so he can watch YouTube and visit Instagram!!! The CCP is fuming!!! π²π²π²π²
inb4 linux nerds say "who is ispeedshow", wake up bro, this guy is singlehandedly STOPPING APT41 by visiting mainland china and stuff
ishowspeed π€apt41
ishowspeed π€apt41
π₯85π€15π«‘11π8π4β€1π1π’1
oracle: ok someone hacked us on jan 22nd, but it was old data from something we were moving, no big deal
the fbi: lol wtf?
https://www.reuters.com/technology/fbi-investigating-cyberattack-oracle-bloomberg-news-reports-2025-03-28/
the fbi: lol wtf?
https://www.reuters.com/technology/fbi-investigating-cyberattack-oracle-bloomberg-news-reports-2025-03-28/
Reuters
FBI investigating cyberattack at Oracle, Bloomberg News reports
The Federal Bureau of Investigation (FBI) is probing the cyberattack at Oracle that has led to the theft of patient data, Bloomberg News reported on Friday, citing a person familiar with the matter.
π68π15π€£10π₯6π5β€1π±1π’1π1π€1
Forwarded from /g/βs Tech Memes (krust. | ΞΚsnΙΉΚ)
This media is not supported in your browser
VIEW IN TELEGRAM
fedex workers delivering my server
π―94π€£61π’20π€―6π4β€1π1π₯°1π1
Shoutout to zhangsansec for successfully compromising vx-underground.
A few days ago we put vx-underground in a debug state. We forgot to revert it back.
zhangsansec discovered this, exploited it, and instead of memeing us he notified us so we could fix it
A few days ago we put vx-underground in a debug state. We forgot to revert it back.
zhangsansec discovered this, exploited it, and instead of memeing us he notified us so we could fix it
π₯174π€£36β€22π«‘19π9π€2π€2π1π’1
vx-underground
Shoutout to zhangsansec for successfully compromising vx-underground. A few days ago we put vx-underground in a debug state. We forgot to revert it back. zhangsansec discovered this, exploited it, and instead of memeing us he notified us so we could fixβ¦
hehe whoopsies, accidentally did something, didnt undo change, and got pwned (we were working in prod)
π₯159π€£54π₯°17π€11π«‘3π2β€1π1
Malware is on the internet
π±179π€―55π₯14π5π€5π4π―4π€3π’2π«‘2β€βπ₯1
Today EUROPOL announced the takedown of a large and prolific CSAM (Child Sexual Abuse Material) website known online as "Kidflix" β a reference to Netflix.
Over 35 countries were involved in the operation which was lead by the State Criminal Police of Bavaria (Bayerisches Landeskriminalamt) and the Bavarian Central Office for the Prosecution of Cybercrime (ZCB).
Kidflix was infamous due to it's "unique" features for CSAM websites. It allowed users to filter by video quality, watch child abuse livestreams, and preview videos prior to purchase. Additionally, individuals who were active on the website, shared content, produced unique content, etc. could earn "Kidflix tokens" which allowed them to get other CSAM material for free. Furthermore, the site had 3.5 unique CSAM videos uploaded every hour, with a total of 6,288 hours (262 days) of CSAM videos present on the website.
Law enforcement learned over 1,800,000 people from all across the globe visited Kidflix. Kidflix contained over 72,000 videos of CSAM.
As a result of the takedown over 1,400 suspects have been identified and (thus far) 79 individuals have been apprehended and 39 children has been rescued from child predators.
This operation, dubbed "Operation Stream", is the largest pedophile network takedown European history. EUROPOL has stated they will continue to work with other countries law enforcement agencies to hold each person accountable for the crimes committed on Kidflix.
Over 35 countries were involved in the operation which was lead by the State Criminal Police of Bavaria (Bayerisches Landeskriminalamt) and the Bavarian Central Office for the Prosecution of Cybercrime (ZCB).
Kidflix was infamous due to it's "unique" features for CSAM websites. It allowed users to filter by video quality, watch child abuse livestreams, and preview videos prior to purchase. Additionally, individuals who were active on the website, shared content, produced unique content, etc. could earn "Kidflix tokens" which allowed them to get other CSAM material for free. Furthermore, the site had 3.5 unique CSAM videos uploaded every hour, with a total of 6,288 hours (262 days) of CSAM videos present on the website.
Law enforcement learned over 1,800,000 people from all across the globe visited Kidflix. Kidflix contained over 72,000 videos of CSAM.
As a result of the takedown over 1,400 suspects have been identified and (thus far) 79 individuals have been apprehended and 39 children has been rescued from child predators.
This operation, dubbed "Operation Stream", is the largest pedophile network takedown European history. EUROPOL has stated they will continue to work with other countries law enforcement agencies to hold each person accountable for the crimes committed on Kidflix.
β€406π115π41π«‘31π₯17π’11β€βπ₯9π9π€£2π€2π€1