Lisa

498 posts

Lisa banner
Lisa

Lisa

@itslisaram

Digital Surveillance & CTI | CS Engineering | #OSINT |

Cyberia Katılım Temmuz 2021
666 Takip Edilen80 Takipçiler
Lisa retweetledi
vxdb
vxdb@vxdb·
Googles Threat Intelligence Grpup has attributed the Axios supply chain attack to North Korean-nexus group UNC 1069
English
10
49
340
49.1K
Lisa retweetledi
IntelOps
IntelOps@IntelOpsV3·
Vect and TeamPCP have reportedly partnered, but that is not all. Every member of Hasan BF automatically becomes an affiliate. We have never seen anything like this before, what is going on? 😂
IntelOps tweet media
English
12
17
124
15.3K
Lisa retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
❗️Just 13 hours after TeamPCP's Trivy supply chain exploitation, one of the groups involved was already recruiting negotiators. Today the group announced a partnership with BreachForums: every forum user automatically becomes an affiliate, with ransomware and support included.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
7
38
248
28.6K
Lisa retweetledi
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
🚨 TeamPCP Supply Chain Attack — Multi-Stage Cloud-Native Campaign Uncovered A sophisticated campaign attributed to TeamPCP has compromised multiple ecosystems through a chained supply chain attack impacting Trivy, KICS, LiteLLM, and 45+ npm packages. Key highlights: • Initial access via exposed PAT (Pwn Request) • Malicious packages pushed into CI/CD pipelines • Lateral movement through Aqua Security’s Trivy ecosystem • Deployment of Kubernetes wiper + worm (kamikaze.sh evolution) • Expansion into Checkmarx and broader developer ecosystems ⚠️ The attack propagated in under 5 days, combining credential theft, poisoned dependencies, and automated distribution pipelines. This campaign demonstrates how modern supply chain attacks are fast, scalable, and cloud-native by design, targeting developers as the new attack surface. #CyberSecurity #SupplyChainAttack #ThreatIntel #DevSecOps #CloudSecurity #Kubernetes #Infosec #DailyDarkWeb
Dark Web Intelligence tweet media
English
1
7
31
5.1K
Lisa retweetledi
Hackmanac
Hackmanac@H4ckmanac·
🚨Cyber Alert ‼️ 🇪🇸Spain - Ministerio de Hacienda The threat actor going by the name ‘HaciendaSec’ claims to have breached the Ministerio de Hacienda. Allegedly, the attackers are offering for sale an updated database covering 47.3 million citizens, including DNI/NIF numbers, full names, residential addresses, phone numbers, email addresses, IBAN bank details, and tax-related financial information. Sector: Government Threat class: Cybercrime Observed: Jan 31, 2026 Status: Pending verification — About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded, copied, or redistributed, and sensitive details were redacted from the attached screenshot(s). For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
Hackmanac tweet media
English
312
2.2K
6.1K
2.4M
Lisa retweetledi
Hackmanac
Hackmanac@H4ckmanac·
🚨Cyber Alert Update‼️ 🇪🇸Spain - Endesa The hacker who claimed to have breached Endesa has leaked data from 300,000 customers and is threatening to sell over 1TB of data, affecting more than 20 million people, unless the company responds by February 2–3, 2026. The attacker reportedly accessed Endesa’s commercial platform and exfiltrated customer contact details, identity documents, and IBANs. A small sample was released earlier, followed by a larger leak to escalate pressure. Endesa has confirmed the unauthorized access. Source: eleconomista.es/tecnologia/not…
Hackmanac tweet media
Hackmanac@H4ckmanac

🚨Cyber Alert ‼️ 🇪🇸Spain - Endesa A threat actor known as “spain” claims to have breached Endesa and is selling an allegedly new and unique database containing data on over 20 million individuals. The dataset reportedly totals about 1.05 TB across multiple .sql files and includes sensitive information such as IBANs, national IDs, contact details, addresses, and customer and billing records. Sector: Energy / Utilities Threat class: Cybercrime Observed: Jan 05, 2025 Status: Pending verification — About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded, copied, or redistributed, and sensitive details were redacted from the attached screenshot(s). For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.

English
11
197
524
64.8K
Lisa retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️Shinyhunte[.]rs is back online with "Doomsday The Story of James". At the end you accept and download BreachForums database. I reviewed the data and it is legit. Why? My user ID leading to a fake email address shows. If you ever registered on BF... GGs. Use alts! 😂
Dark Web Informer tweet mediaDark Web Informer tweet media
English
8
12
122
46.4K
Lisa retweetledi
VenariX
VenariX@_venarix_·
A user from a #hackers forum may have possibly leaked customer data linked to #Endesa (@Endesa), the leading Spanish 🇪🇸 company in the generation, distribution, and commercialization of electricity and natural gas. This could be a new #CyberAttack adding to those accumulated by #Endesa. #BME $ELE @EndesaClientes @EnelGroupES Stay informed, monitor cyber threats, and sign up for free on #VenariX 👉 venarix.com #CyberAttack #España #Madrid #Barcelona #energia #electricity #gas #InfoSec #Ciberseguridad #CyberSec
VenariX tweet mediaVenariX tweet media
English
0
3
3
1.4K
Lisa retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
🚨BreachForums is back again... Clearnet: breachforums[.]bf Dark Web: http://breachedmw4otc2lhx7nqe4wyxfhpvy32ooz26opvqkmmrbg73c7ooad[.]onion IP: 91.215.85.48 ASN: 200593 Server: Apache/2.4.65 (Debian) IP: 45.134.26.22 ASN: 198953 Server: Apache/2.4.65 (Debian)
Dark Web Informer tweet mediaDark Web Informer tweet media
English
10
70
585
96.8K
Lisa retweetledi
elhacker.NET
elhacker.NET@elhackernet·
Los 77Gb robados a Iberia Documentos técnicos, programas de mantenimiento, configuraciones de aeronaves y datos confidenciales de Airbus Archivos CSV, PDF y BD sistema ACDATA de Airbus Firmas digitales (DocuSign) y variaciones de SLA Certificado de Operador Aéreo (AOC)
elhacker.NET tweet media
Español
9
88
282
18.8K
Lisa retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
🚨RaidForums V2 appears to be a thing... raidforums[.]st
Dark Web Informer tweet mediaDark Web Informer tweet media
English
19
53
366
148.6K
Lisa retweetledi
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
Spain 🇪🇸 - Iberia has allegedly been breached, with a threat actor offering 77 GB of sensitive data for sale, including aircraft maintenance programs, technical configurations, and Air Operator Certificates. dailydarkweb.net/iberia-airline…
Dark Web Intelligence tweet media
English
2
9
24
7K
Lisa retweetledi
Hackmanac
Hackmanac@H4ckmanac·
🚨Cyber Alert ‼️ 🇪🇸Spain - ING Bank Spain The threat actor BreachParty has claimed responsibility for a data breach involving 21,090 records from ING Bank Spain. According to the attacker, the compromised data includes personally identifiable information (PII) such as ID numbers, dates of birth, full names, cities, phone numbers, IBANs, bank codes, and bank names. Sector: Financial Threat class: Cybercrime Observed: Nov 5, 2025 Status: Pending verification — About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded, copied, or redistributed, and sensitive details were redacted from the attached screenshot(s). For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
Hackmanac tweet media
English
23
162
417
188.5K
Lisa retweetledi
Hackmanac
Hackmanac@H4ckmanac·
🚨Cyber Alert ‼️ 🇪🇸Spain - Spain citizens: 34 million records for sale The threat actor "Cayenne22" claims to be selling 34 million records of Spanish citizens' data, including full name, DNI, email, phone number and IBAN. Threat class: Cybercrime Observed: Oct 31, 2025 Status: Pending verification — About this post: Hackmanac provides early warning and cyber situational awareness through its social channels. This alert is based on publicly available information that our analysts retrieved from clear and dark web sources. No confidential or proprietary data was downloaded, copied, or redistributed, and sensitive details were redacted from the attached screenshot(s). For more details about this incident, our ESIX impact score, and additional context, visit HackRisk.io.
Hackmanac tweet media
English
32
293
599
98.3K
Lisa
Lisa@itslisaram·
here we go!! #39c3
Lisa tweet media
English
0
1
3
705
🅰️s_informático
🅰️s_informático@as_informatico·
Actualizado el firmware del @flipper_net con la ultima versión de Unleashed y las extra apps, a ver qué novedades trae...
🅰️s_informático tweet media
Español
5
38
233
10K