The hacker behind the data leak claims they downloaded the Raychat app data when the company exposed its entire database online between...
The database contained 7GB worth of data including fake Amazon product reviews and PayPal email addresses of scammers among other sensitive data. Whoever...
The leaked WedMeGood database contains 41.5 GB worth of data which is another massive data leak from ShinyHunters. ShinyHunters, the notorious hacker...
Are you looking for your important file which accidentally got deleted while cleaning out the garbage from your device? Did you lose...
Programs work with databases, and if the database crashes essential information can be lost and this will be disastrous to the user....
If you need to extract data from a page or website there are two ways to go about it: you can do...
The data was leaked earlier today on an infamous hacker forum without users’ Facebook accounts passwords. For the last couple of years,...
Collect OSINT for GitLab groups and members and search the group and group members’ snippets, issues, and issue discussions for sensitive...
Research reveals startling new findings on Android data collection and how it sends 2-times more data to Google than iOS to Apple...
A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces output...
SARENKA is an Open Source Intelligence (OSINT) tool which helps you obtaining and understanding Attack Surface. The main goal is to...
Oblivion is a tool focused in real time monitoring of new data leaks, notifying if the credentials of the user has...
Moscow, the capital of Russia, has 175,000 CCTV cameras for surveillance purposes. Out of these, over 4,000 cameras are installed in crowded...
The IT security researchers at vpnMentor have discovered a trove of insecure data hosting on a company based in the United...
A hacker group has released a new database of stolen payment cards on Joker’s Stash, a popular hacking forum. According to web...
Data protection experts reported an intrusion that has impacted Adobe Magento Marketplace users, employed to purchase, sell, and download themes and plugins...
The database was available for anyone to access without a password. Recently on October 16, 2019, a team of two dark web...
Over the past few months, we’ve come across data breaches that are bad for anyone but the bad guys themselves. But just...
These files contain configuration for producing EDR (endpoint detection and response) data in addition to standard system logs. These configurations enable...
MalConfScan is a Volatility plugin extracts configuration data of known malware. Volatility is an open-source memory forensics framework for incident response...
External hard drives are one of the convenient forms of data storage. You could store GBs or even terabytes of data and...