PrivacyHawk

1.4K posts

PrivacyHawk banner
PrivacyHawk

PrivacyHawk

@Privacy_Hawk

The Personal Data Management App that lets you opt-out, unsubscribe and delete your private data from companies, all in one app. Available for iOS and Android📲

Entrou em Mart 2021
21 Seguindo259 Seguidores
Tweet fixado
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
Your info’s out there but it’s not too late to take back control.
PrivacyHawk tweet media
English
0
1
2
971
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
Biometric data works differently from passwords. If a password leaks, you can change it. If biometric data leaks, you can’t. Fingerprints, face scans, and other biometrics are stored as digital templates, mathematical versions of your physical traits. If those templates are exposed, there’s no reset button. That’s why how organizations store and protect biometric data matters so much. Unlike passwords, it’s not something you can simply replace.
PrivacyHawk tweet media
English
0
0
0
9
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
When contracts, emails, and PII sit together at that scale, the value goes well beyond ransom pressure. Internal communications and deal terms can be reused for impersonation, invoice fraud, or competitive leverage across partners and suppliers. Once hundreds of gigabytes of that context leave the network, the impact tends to show up later in how that data gets reused.
English
0
0
0
22
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
Ethiopia 🇪🇹 - National Oil Ethiopia PLC (NOC) has allegedly been compromised, resulting in the exfiltration of over 800GB of sensitive data including PII, contracts, and emails. dailydarkweb.net/national-oil-e…
Dark Web Intelligence tweet media
English
2
4
12
2.2K
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
Countdowns like this are mostly pressure tactics, but the data behind them is the real concern. Military institutes hold structured identity data, internal communications, and sometimes training or administrative records that can be reused for impersonation or targeted scams. Once that information is copied, the timeline matters less than how it gets reused afterward.
English
0
0
0
5
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
United States 🇺🇸 - Marion Military Institute was allegedly compromised by the Worldleaks ransomware group, with the threat actors initiating a countdown threatening to leak the historic military college's data. dailydarkweb.net/marion-militar…
Dark Web Intelligence tweet media
English
1
4
12
2.7K
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
This isn’t just another supply chain story, it’s automation at scale. Exposed tokens and poisoned packages let attackers move through CI/CD pipelines and developer tools faster than teams can react, turning trust relationships into distribution channels. The real shift is how quickly this kind of access propagates across ecosystems once it’s seeded, not just the initial compromise.
English
0
0
1
40
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
🚨 TeamPCP Supply Chain Attack — Multi-Stage Cloud-Native Campaign Uncovered A sophisticated campaign attributed to TeamPCP has compromised multiple ecosystems through a chained supply chain attack impacting Trivy, KICS, LiteLLM, and 45+ npm packages. Key highlights: • Initial access via exposed PAT (Pwn Request) • Malicious packages pushed into CI/CD pipelines • Lateral movement through Aqua Security’s Trivy ecosystem • Deployment of Kubernetes wiper + worm (kamikaze.sh evolution) • Expansion into Checkmarx and broader developer ecosystems ⚠️ The attack propagated in under 5 days, combining credential theft, poisoned dependencies, and automated distribution pipelines. This campaign demonstrates how modern supply chain attacks are fast, scalable, and cloud-native by design, targeting developers as the new attack surface. #CyberSecurity #SupplyChainAttack #ThreatIntel #DevSecOps #CloudSecurity #Kubernetes #Infosec #DailyDarkWeb
Dark Web Intelligence tweet media
English
1
7
29
4.5K
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
Password hashes plus personal and billing context is what makes this kind of leak stick. Even if the hashes aren’t immediately cracked, they get tested across other services, and any reused passwords fall quickly. Once hundreds of thousands of profiles circulate, it stops being about ProCamps and becomes about where those identities and credentials get reused next.
English
0
0
0
19
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
United States 🇺🇸 - ProCamps has allegedly been breached, exposing 623,000 personal records for sale, including names, addresses, password hashes, and partial billing information. dailydarkweb.net/procamps-suffe…
Dark Web Intelligence tweet media
English
2
4
14
2.4K
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
It’s spring cleaning season and your apps deserve a review too. Try this quick cleanup: 📍 Switch your precise location → approximate 👥 Remove contact access most apps don’t need 🎤 Turn off mic/camera permissions when not in use 🧹 Delete old apps or accounts you no longer use Small changes. Less data exposure.
PrivacyHawk tweet media
English
0
0
0
13
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
Claims at that scale matter less for the headline numbers and more for what kind of access they imply. If configurations and source code are involved, the risk shifts from data exposure to insight into how environments are structured and secured. For a hosting provider, that kind of context can be reused across thousands of downstream customers, not just the original breach.
English
0
0
0
38
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
France 🇫🇷 - OVHcloud has allegedly been breached, with an actor claiming to sell data belonging to 1.6 million customers and 5.9 million websites, exposing personal information, source code, and configurations. dailydarkweb.net/ovhcloud-data-…
Dark Web Intelligence tweet media
English
3
5
16
3.7K
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
Compromising ESXi hosts suggests access at the infrastructure layer, not just an app-level breach. Splunk logs, ticketing data, and C-level emails together provide a map of internal activity, incidents, and decision-making that’s easy to reuse for targeted phishing or follow-on attacks. Once that operational visibility is exposed, it becomes a playbook for future intrusion, not just a one-time leak.
English
0
0
0
46
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
United States 🇺🇸 - Defion Security has allegedly been breached by an unnamed actor who compromised three ESXi hosts, resulting in the sale of Splunk logs, ticketing data, and C-level emails. dailydarkweb.net/defion-securit…
Dark Web Intelligence tweet media
English
1
9
23
3.4K
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
Semiconductor project files carry more value than typical corporate data. Designs, process details, and internal documentation can be reused for competitive intelligence or supply chain targeting without needing direct access to production systems. Once that kind of technical context leaks, it tends to have a longer shelf life than the ransomware claim itself.
English
0
0
0
18
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
The 9-day gap is the part to watch. When incidents sit before disclosure, it’s usually time for data access, copying, and validation before anything goes public. Even if the breach scope turns out limited, that window is often enough for emails and account data to start circulating and getting reused in phishing tied to real user activity.
English
0
0
1
16
IDEAL NEWS
IDEAL NEWS@Idealnewscentre·
🚨 Crunchyroll has OFFICIALLY CONFIRMED A DATA BREACH. “We are aware of the claims and are working with leading cybersecurity experts to investigate.” ⚠️ The incident reportedly occurred 9 DAYS AGO, with claims it was initially downplayed before being publicly addressed.
IDEAL NEWS tweet media
IDEAL NEWS@Idealnewscentre

🚨 Crunchyroll was reportedly breached via a TELUS partner, exposing ~100GB of user data (emails, IPs, and alleged credit card info). ⚠️ The incident allegedly occurred on March 12, 2026 and was contained within 24 hours. TELUS has confirmed a breach the same day, with reports of up to 1PB of data stolen overall. ❗ Crunchyroll has not yet issued an official statement.

English
1
0
0
82
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
Discounted access listings like this are about volume, not sophistication. Selling multiple cloud footholds across industries suggests initial access brokerage, where attackers monetize entry points instead of exploiting them themselves. Once those accesses are resold, the risk shifts from one actor to many, each deciding how to turn that foothold into fraud, data theft, or deeper compromise.
English
0
0
0
202
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️🇮🇳🇧🇷🇨🇴 A threat actor using the handle "vexin" is offering corporate cloud accesses at a 50% discount. The listing includes seven compromised organizations across India, Brazil, Colombia, and India, spanning industries such as IT solutions, plastic packaging, food & beverage retail, meat retail, and consulting. Data sizes range from 18.92 GB to 4.79 TB, with individual prices between $100–$1,750, or a bulk deal of $3,075 for all accesses.
Dark Web Informer tweet media
English
4
6
46
6.1K
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
Long time spans like 2013–2026 are what make retail breaches stick. Orders, invoices, and B2B data create a detailed history of customers and partners that can be reused for targeted phishing or supplier fraud that feels legitimate. Once that kind of longitudinal data circulates, it tends to get repackaged and exploited well beyond the original leak.
English
0
0
0
33
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
ShinyHunters usually signals data theft first, ransom second. When companies like a school platform and a financial firm are named together, it points to valuable identity and financial datasets that can be monetized even without payment. The threat isn’t just the leak, it’s how that data gets reused for fraud and impersonation once it’s already in hand.
English
0
0
1
126
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️ Infinite Campus, Inc. and Ameriprise Financial, Inc. are both being threatened by ShinyHunters to pay the ransom.
Dark Web Informer tweet media
English
3
6
25
5.5K
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
Lobbying systems concentrate relationship data that isn’t meant to be public in full context. Schedules, contacts, and identification details can map influence networks and enable targeted impersonation or pressure tactics that feel legitimate. Once that kind of institutional context is exposed, it tends to be reused in ways that go well beyond the original leak.
English
0
0
0
120
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
Chile 🇨🇱 - The Government of Chile's Ley Lobby portal has allegedly been breached, with 250GB of sensitive lobbying records, official schedules, and personal identification data posted for sale. dailydarkweb.net/government-of-…
Dark Web Intelligence tweet media
English
4
14
40
3.9K
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
When source code, cloud configs, and access secrets show up together, the risk isn’t just IP loss, it’s potential reuse of access paths. Secrets and infrastructure details can let attackers test environments or pivot into connected systems without starting from scratch. Even a 3GB dump can carry outsized impact if it exposes how the environment is actually wired together.
English
0
0
0
75
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
United Kingdom 🇬🇧 - AstraZeneca has allegedly been breached by the LAPSUS$ group, who are attempting to privately sell a 3GB data dump containing source code, cloud infrastructure configs, and access secrets. dailydarkweb.net/astrazeneca-al…
Dark Web Intelligence tweet media
English
1
15
28
3.5K
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
Energy infrastructure data carries a different kind of risk than typical corporate leaks. Technical drawings and engineering certificates can reveal system layouts, dependencies, and operational constraints that don’t change quickly. Once that kind of information is exposed, the concern isn’t just data loss, it’s how those insights could be reused long after the breach claim.
English
0
0
0
90
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
Slovenia 🇸🇮 - Energetika Ljubljana allegedly suffered a breach exposing 2 TB of national energy infrastructure documents, including technical drawings and engineering certificates for the TE-TOL project. dailydarkweb.net/energetika-lju…
Dark Web Intelligence tweet media
English
2
3
22
3.4K
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
Agricultural manufacturers don’t just hold internal files, they sit in the middle of supplier, distributor, and customer networks. Corporate data at that scale likely includes contracts, pricing, and operational details that can be reused for fraud or competitive pressure. Once hundreds of gigabytes of that context are copied, the leverage extends well beyond the ransom demand.
English
0
0
0
15
Dark Web Intelligence
Dark Web Intelligence@DailyDarkWeb·
France 🇫🇷 - Pellenc has allegedly been compromised by the Alp-001 ransomware group, which claims to have stolen 228GB of corporate data from the agricultural equipment manufacturer and is threatening a leak. dailydarkweb.net/pellenc-ransom…
Dark Web Intelligence tweet media
English
2
4
11
3K
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
Insurance breaches tend to carry long-tail risk because policy data ties identity to coverage and financial context. Even without full claims histories, names, contact details, and policy info can fuel highly believable fraud and impersonation tied to real insurance activity. The disruption is immediate, but the reuse of that data usually shows up later.
English
0
0
0
16
PrivacyHawk
PrivacyHawk@Privacy_Hawk·
Settlements like this tend to close the legal loop, not the exposure. Patient data involved in healthcare breaches, even without full medical charts, can be reused for identity fraud and highly targeted scams for years. The payout is one-time, but the data often keeps circulating well beyond the case.
English
0
0
0
4
The HIPAA Journal
The HIPAA Journal@HIPAAJournal·
Essen Medical Associates Agree to $4 Million Settlement to Resolve Class Action Data Breach Lawsuit zurl.co/DACxe
English
1
1
0
36
DiscussingFilm
DiscussingFilm@DiscussingFilm·
‘SPIDER-MAN: BRAND NEW DAY’ is the biggest movie trailer launch of all time with 718.6M views. ‘DEADPOOL & WOLVERINE’ is second with 365M views.
DiscussingFilm tweet mediaDiscussingFilm tweet mediaDiscussingFilm tweet mediaDiscussingFilm tweet media
English
1K
13.2K
135.2K
5.8M