vx-underground
oracle WAS NOT hacked! a criminal just happened to PERFECTLY guess customer data and it BY CHANCE perfectly matched the data of healthcare customers!!!
ORACLE WAS NOT COMPROMISED! oracle intentionally inserted a weird txt file into there website with a criminals email address!!!!
π151π€£64β€8π2π₯2π±2π«‘2π’1π1
vx-underground
π¨BREAKINGπ¨ IShowSpeed will be performing a A BACKFLIP over the Great Firewall of China so he can watch YouTube and visit Instagram!!! The CCP is fuming!!! π²π²π²π²
inb4 linux nerds say "who is ispeedshow", wake up bro, this guy is singlehandedly STOPPING APT41 by visiting mainland china and stuff
ishowspeed π€apt41
ishowspeed π€apt41
π₯85π€15π«‘11π8π4π1π’1
oracle: ok someone hacked us on jan 22nd, but it was old data from something we were moving, no big deal
the fbi: lol wtf?
https://www.reuters.com/technology/fbi-investigating-cyberattack-oracle-bloomberg-news-reports-2025-03-28/
the fbi: lol wtf?
https://www.reuters.com/technology/fbi-investigating-cyberattack-oracle-bloomberg-news-reports-2025-03-28/
Reuters
FBI investigating cyberattack at Oracle, Bloomberg News reports
The Federal Bureau of Investigation (FBI) is probing the cyberattack at Oracle that has led to the theft of patient data, Bloomberg News reported on Friday, citing a person familiar with the matter.
π68π15π€£10π₯6π5β€1π±1π’1π1π€1
Forwarded from /g/βs Tech Memes (krust. | ΞΚsnΙΉΚ)
This media is not supported in your browser
VIEW IN TELEGRAM
fedex workers delivering my server
π―94π€£61π’20π€―6π4β€1π1π₯°1π1
Shoutout to zhangsansec for successfully compromising vx-underground.
A few days ago we put vx-underground in a debug state. We forgot to revert it back.
zhangsansec discovered this, exploited it, and instead of memeing us he notified us so we could fix it
A few days ago we put vx-underground in a debug state. We forgot to revert it back.
zhangsansec discovered this, exploited it, and instead of memeing us he notified us so we could fix it
π₯174π€£36β€22π«‘19π9π€2π€2π1π’1
vx-underground
Shoutout to zhangsansec for successfully compromising vx-underground. A few days ago we put vx-underground in a debug state. We forgot to revert it back. zhangsansec discovered this, exploited it, and instead of memeing us he notified us so we could fixβ¦
hehe whoopsies, accidentally did something, didnt undo change, and got pwned (we were working in prod)
π₯159π€£54π₯°17π€11π«‘3π2β€1π1
Malware is on the internet
π±179π€―55π₯14π5π€5π4π―4π€3π’2π«‘2β€βπ₯1
Today EUROPOL announced the takedown of a large and prolific CSAM (Child Sexual Abuse Material) website known online as "Kidflix" β a reference to Netflix.
Over 35 countries were involved in the operation which was lead by the State Criminal Police of Bavaria (Bayerisches Landeskriminalamt) and the Bavarian Central Office for the Prosecution of Cybercrime (ZCB).
Kidflix was infamous due to it's "unique" features for CSAM websites. It allowed users to filter by video quality, watch child abuse livestreams, and preview videos prior to purchase. Additionally, individuals who were active on the website, shared content, produced unique content, etc. could earn "Kidflix tokens" which allowed them to get other CSAM material for free. Furthermore, the site had 3.5 unique CSAM videos uploaded every hour, with a total of 6,288 hours (262 days) of CSAM videos present on the website.
Law enforcement learned over 1,800,000 people from all across the globe visited Kidflix. Kidflix contained over 72,000 videos of CSAM.
As a result of the takedown over 1,400 suspects have been identified and (thus far) 79 individuals have been apprehended and 39 children has been rescued from child predators.
This operation, dubbed "Operation Stream", is the largest pedophile network takedown European history. EUROPOL has stated they will continue to work with other countries law enforcement agencies to hold each person accountable for the crimes committed on Kidflix.
Over 35 countries were involved in the operation which was lead by the State Criminal Police of Bavaria (Bayerisches Landeskriminalamt) and the Bavarian Central Office for the Prosecution of Cybercrime (ZCB).
Kidflix was infamous due to it's "unique" features for CSAM websites. It allowed users to filter by video quality, watch child abuse livestreams, and preview videos prior to purchase. Additionally, individuals who were active on the website, shared content, produced unique content, etc. could earn "Kidflix tokens" which allowed them to get other CSAM material for free. Furthermore, the site had 3.5 unique CSAM videos uploaded every hour, with a total of 6,288 hours (262 days) of CSAM videos present on the website.
Law enforcement learned over 1,800,000 people from all across the globe visited Kidflix. Kidflix contained over 72,000 videos of CSAM.
As a result of the takedown over 1,400 suspects have been identified and (thus far) 79 individuals have been apprehended and 39 children has been rescued from child predators.
This operation, dubbed "Operation Stream", is the largest pedophile network takedown European history. EUROPOL has stated they will continue to work with other countries law enforcement agencies to hold each person accountable for the crimes committed on Kidflix.
β€406π115π41π«‘31π₯17π’11β€βπ₯9π9π€£2π€2π€1
vx-underground
Today X employees did a sneak peek on some new features. The main highlight is X will now allow you to purchase inactive X handles. The attached image is the actual image shared by X. No idea why its green and formatted like shit.
Excited to watch some OGUsers nerd drop $50,000 for the Xitter handle "poop"
π₯92π22π€£11π4β€3π€2π2π’1
Ransomware groups will be raising extortion demands 10% due to Tariffs
π€£272β€14π€13π€6π₯5π2π2π’1π―1
vx-underground
adding some computer viruses to the website haha u can download computer viruses for fun virussign december - april bazaar 01 and 02 inthewild ??? - ???
For our more serious audience:
We're close to finalizing our virus-dot-exchange, so we've begun moving things out of 'hibernation' and pushing it to prod. We've pushed nearly 100GB of malware. This includes VirusSign from January to April, Bazaar for January and February, and our "InTheWild" collection which is currently syncing.
A rough guesstimation would place the recently added malware somewhere near 500,000 new samples. However, I didn't count.
Cheers,
We're close to finalizing our virus-dot-exchange, so we've begun moving things out of 'hibernation' and pushing it to prod. We've pushed nearly 100GB of malware. This includes VirusSign from January to April, Bazaar for January and February, and our "InTheWild" collection which is currently syncing.
A rough guesstimation would place the recently added malware somewhere near 500,000 new samples. However, I didn't count.
Cheers,
π₯64π€16π―5π€―4π2π’1π€1π1
just took an iq test. scored a 82. a B- isnt too bad!!!
β€133π€£71π€24π€8π―8π6π₯4π4π4π’2π2