Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
7 résultats taggé Platform  ✕
ICE Agent Doxxing Platform was Crippled After Coordinated DDoS Attack – Hackread – Cybersecurity News, Data Breaches, AI, and More https://hackread.com/ice-agent-doxxing-platform-ddos-attack/
17/01/2026 17:57:53
QRCode
archive.org
thumbnail

The activist website called “ICE List” was offline after a massive DDoS attack. The crash followed a leak of 4,500 federal agent names linked to the Renee Nicole Good shooting.
The website ICE List, also known as the (ICE List Wiki), was crippled by a major cyber attack after it prepared to publish the identities of thousands of federal agents in the United States, particularly those associated with Immigration and Customs Enforcement, ICE.

The site’s founder, Netherlands-based activist Dominick Skinner, confirmed that a massive DDoS attack began flooding their servers on Tuesday evening last week.

For your information, a DDoS attack works by flooding a website with so much fake traffic that it eventually crashes. Skinner told reporters that the length and intensity of this attack suggest a deliberate, organised effort to keep the leaked information from reaching the public.

The Shooting That Sparked the Leak
According to The Daily Beast, the data at the centre of this battle was provided by a whistleblower from the Department of Homeland Security (DHS). The leak reportedly includes the names, personal phone numbers, and work histories of roughly 4,500 employees from ICE and Border Patrol.

Further probing revealed that the whistleblower was moved to act following the death of Renee Nicole Good, a 37-year-old mother of three, who was fatally shot by an ICE agent in Minneapolis on January 7, 2026.

Within hours of the shooting, activists managed to identify the agent involved as Jonathan E. Ross. Skinner noted that for the whistleblower, this tragic incident was the “last straw,” leading them to hand over a dataset full of work emails, job titles, and résumé-style background info.

Identifying the Attackers
While the site is back online, Skinner observed that much of the malicious traffic appeared to originate from a bot farm in Russia. However, it is nearly impossible to track the true source, as in the world of hacking, proxies are often used to bounce signals through different countries to hide a person’s tracks. Skinner described the attack as “sophisticated,” suggesting that the attackers are highly determined to keep the names hidden.

Skinner’s team continues to operate out of the Netherlands to stay beyond the immediate reach of US authorities. Despite the crash, they remain committed to the project with plans to move to more secure servers. They plan to publish most of the names, though they intend to omit certain staff members, such as nurses or childcare workers.

hackread.com EN 2026 doxxing US Platform ICE-List
International investigation disrupts phishing-as-a-service platform LabHost https://www.europol.europa.eu/media-press/newsroom/news/international-investigation-disrupts-phishing-service-platform-labhost
24/04/2025 13:42:17
QRCode
archive.org
thumbnail

Between Sunday 14 April and Wednesday 17 April a total of 70 addresses were searched across the world, resulting in the arrest of 37 suspects. This includes the arrest of 4 individuals in the United Kingdom linked to the running of the site, including the original developer of the service.The LabHost platform, previously available on the open web, has been...

Europol EN 2025 phishing-as-a-service platform LabHost busted disrupted
Global crackdown on Kidflix, a major child sexual exploitation platform with almost two million users | Europol https://www.europol.europa.eu/media-press/newsroom/news/global-crackdown-kidflix-major-child-sexual-exploitation-platform-almost-two-million-users?ref=metacurity.com
03/04/2025 22:07:10
QRCode
archive.org
thumbnail

Kidflix, one of the largest paedophile platforms in the world, has been shut down in an international operation against child sexual exploitation. The investigation was supported by Europol and led by the State Criminal Police of Bavaria (Bayerisches Landeskriminalamt) and the Bavarian Central Office for the Prosecution of Cybercrime (ZCB). Over 35 countries worldwide participated in the operation. almost 1 400 suspects worldwide. So far, 79 of these individuals have been arrested...

europol EN 2025 Kidflix sexual exploitation platform paedophile Bavaria busted
Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives? • KELA Cyber Threat Intelligence https://www.kelacyber.com/blog/three-months-after-the-storm-did-cybercriminals-move-to-telegram-alternatives/
20/12/2024 09:19:49
QRCode
archive.org
thumbnail

Introduction Telegram, as previously reported by KELA, is a popular and legitimate messaging platform that has evolved in the past few years into a major platform for cybercriminal activities. Its lack of strict content moderation has made the platform cybercriminals’ playground. They use the platform for distribution of stolen data and hacking tools, publicizing their […]

kelacyber EN 2024 Telegram analysis KELA platform cybercriminals
The iSOON Disclosure: Exploring the Integrated Operations Platform https://bishopfox.com/blog/the-isoon-disclosure-exploring-the-integrated-operations-platform
22/03/2024 09:14:22
QRCode
archive.org
thumbnail

Bishop Fox examines the iSoon data disclosure from an offensive security perspective and an analysis of the platform's capabilities, design, features.

Bishop-Fox bishopfox EN 2024 iSOON Integrated Operations Platform China analysis
Unauthorized Access to Cross-Tenant Applications in Microsoft Power Platform https://www.tenable.com/security/research/tra-2023-25
04/08/2023 09:35:57
QRCode
archive.org

A researcher at Tenable has discovered an issue that enables limited, unauthorized access to cross-tenant applications and sensitive data (including but not limited to authentication secrets). Background The issue occurred as a result of insufficient access control to Azure Function hosts, which are launched as part of the creation and operation of custom connectors in Microsoft’s Power Platform (Power Apps, Power Automation).

tenable 2023 EN cross-tenant Cloud Microsoft-Power Platform
The Fresh Phish Market: Behind the Scenes of the Caffeine Phishing-as-a-Service Platform https://www.mandiant.com/resources/blog/caffeine-phishing-service-platform
11/10/2022 08:42:18
QRCode
archive.org
thumbnail

Bad actors are using a shared Phishing-as-a-Service platform called “Caffeine”.

mandiant EN 2022 Caffeine Phishing-as-a-Service Platform
4982 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn