The latest incarnation of the notorious BreachForums hacking forum suffered a significant data breach, with a user database containing 323,988 account records leaked online. The exposed data includes usernames, registration dates, and IP address information including over 70,000 records with public IPs that pose operational security (OPSEC) concerns for members. The leak occurred when a forum backup specifically a MyBB users table file named databoose[.]sql was temporarily stored in an unsecured folder during a restoration process after the forum’s previous domain was shut down following operator arrests. The archive also contained a PGP private key once used to sign official BreachForums communications. Initially promised to be passphrase protected, independent researchers later confirmed that the PGP key passphrase itself was published, undermining its security. Most of the leaked IP addresses map to a local loopback address, offering little investigatory value. However, approximately 70,296 records contain public IPs that could be valuable to law enforcement and security researchers for linking threat actors to other activities or locations. The forum administrator handling the current BreachForums iteration operating under the alias claimed that the exposure was unintentional, stemming from an old database backup and not a targeted exploit of the underlying software.
Cisco has announced the discovery of two significant security flaws in its Snort 3 intrusion detection engine that impact a wide range of enterprise security solutions, including f...
GitLab has released an urgent security update for both its Community Edition (CE) and Enterprise Edition (EE), addressing multiple vulnerabilities that pose significant risks to us...
The Illinois Department of Human Services (IDHS) has confirmed a major data exposure incident affecting nearly 700,000 residents, caused by incorrect privacy settings on an online ...