Executive Summary
This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data. The dataset comprises 97 distinct cybersecurity events primarily logged on March 14, 2026. The incidents span a wide array of attack vectors, including data breaches, website defacements, the sale of initial access to corporate networks, and targeted cyberattacks against critical infrastructure. The threat landscape is highly active, with threat actors utilizing both the open web (forums) and Telegram to publish their claims and sell compromised data.
1. High-Impact Data Breaches
Data breaches represent a significant portion of the logged incidents, with threat actors exposing millions of records containing Personally Identifiable Information (PII), financial data, and internal corporate communications.
- Egypt Ministry of Health and Population: A threat actor named “aha” claims to be selling a database containing approximately 4 million records, including patient names, national ID numbers, medical procedures, and operation details.
- MagicSlides (India): The threat actor “Sythe” claims to have leaked 2.3 million unique user records, exposing user IDs, email addresses, and subscription plan information.
- Coopsana (Colombia): Threat actor “NyxarGroup” claims to have breached a database containing 1.1 million records with patient names, emails, and medical appointment details.
- Discord Inc. (USA): Threat actor “ozzy0xd” alleges the breach of four databases containing over 1 million logs of sensitive user information, including IP addresses and phone numbers.
- Fargo (Uzbekistan): Threat actor “Tanaka” claims to have breached 980,000 rows of sensitive information, including passport details and addresses.
- French Databases: Threat actor “admmonero” claims to have leaked a dataset containing approximately 817,000 records, including over 726,000 email addresses and phone numbers. Another threat actor, “HexDex,” is selling data of 393,374 members from the French Federation of Canoe Kayak and Paddle Sports.
- CGFI (USA): Threat actor “max987” leaked a database exposing over 800,000 PII records and more than 40,000 financial documents.
- TruCompare (India): “NetStrike” claims to have gained access to approximately 785,000 customer records.
- Casinovale (Turkey): “LockBitData” leaked data of 554,009 users from this Turkish gambling platform.
- MyComplianceOffice (Canada): “FulcrumSec” claims to have leaked production database dumps, 395,000 email archives, Microsoft Teams messages, and trader text messages.
2. Initial Access & Broker Markets
A prominent trend in the data is the sale of initial access to corporate networks, administrative panels, and content management systems. These sales are largely facilitated on open web forums.
- AshleyWood2022: This highly active threat actor is selling unauthorized administrative access to multiple platforms, including WriterBay (Ukraine) , PR.com (USA) , TruyenAudioCV (Vietnam) , and CPAGrip (USA).
- Malwareboy: This actor specializes in compromising e-commerce infrastructure, claiming to sell unauthorized Magento CMS access in Australia and Germany , as well as access to a compromised Magento store in Ireland utilizing iframe injection targeting Stripe payments.
- Big-Bro: This actor claims to be selling administrative access to a Brazilian company , a dataset with Sophos VPN credentials from a Slovakian organization , and telecommunications network access in Kuwait obtained via FortiVPN.
- Saturned33: This actor claims to be selling RDP and shell access to a South African insurance organization, allegedly holding Domain Admin and SYSTEM-level privileges across over 90 hosts, with access to 1.5 TB of data and 11 TB of backups.
- XSSRAT: Claims to be selling corporate database access to an unidentified Indian construction company, reportedly containing 44GB of information.
- We are MONARCH: This group alleges initial unauthorized access to highly secure intelligence agencies, specifically the CIA, Mossad, and Israel’s Unit 8200.
3. Targeted Cyberattacks & Alerts
Several incidents highlight direct cyberattacks intended to disrupt operations or wage psychological warfare.
- National Centre for Nuclear Research (Poland): An attempted cyberattack targeted the institute’s IT infrastructure, though security systems blocked the intrusion before any compromise occurred. The MARIA reactor continued to operate safely.
- TEREM Emergency Medical Centers (Israel): The “Cyber Islamic resistance” group claims to have targeted the surveillance camera control centers and monitoring infrastructure of this urgent care network.
- Psychological Warfare/Threat Messaging: Pro-Iran affiliated channels (iraninarabic_ir) circulated graphics warning employees of major U.S. tech companies—including Google, Apple, Microsoft, and AWS—to evacuate offices in several Gulf cities.
4. Widespread Defacement Campaigns
Website defacement is a frequent tactic utilized by specific threat actor groups in this dataset, often targeting vulnerable content management systems (like WordPress) or small-to-medium organizations globally.
- BABAYO EROR SYSTEM: This is the most prolific defacement group in the dataset. They have targeted numerous domains across multiple countries, including South Korea , Singapore , Canada , the USA , Portugal , Brazil , Romania , and the UAE.
- Hax.or: This group actively defaces websites, with a notable focus on Spain, including targets like Pinturas Héctor Alviarez , DiPatrizio Hostelería , Ogenix , and Las Variedades de Ali. They also targeted several USA-based entities under the “Salas” brand, such as Salas Staffing , Salas Records , and Salas Games.
- Regional Defacers: Groups like “INDOHAXSEC” , “DEFACER INDONESIAN TEAM” , and “INDRAMAYU CHAOS SYSTEM” indicate a highly active defacement community operating out of or claiming affiliation with Indonesia, targeting entities both locally and internationally.
5. Government and Military Targeting
State, local, and military organizations are frequent targets for data extraction and exposure.
- Ukraine: Threat actor “brass” claims to have leaked the personal and professional information of officials associated with the Security Service of Ukraine (SBU).
- China: “ModernStealer” claims to be selling records allegedly belonging to People’s Liberation Army (PLA) officers.
- Israel: “Handala Hack” claims to have leaked personal information, including names, photographs, and addresses, of 50 senior officers associated with the Israeli Navy.
- Indonesia: Data leaks targeted the Indonesian Forestry Service , PTK Kab Probolinggo , DISKOMINFO Mentawai , and the Buolkab Government.
Conclusion
The provided dataset paints a picture of a relentless and multifaceted cyber threat environment. Initial access brokers are thriving by compromising VPNs, CMS platforms like Magento, and administrative panels, setting the stage for future ransomware or data extortion events. Meanwhile, massive data breaches continue to expose millions of personal and financial records globally, affecting sectors from healthcare to e-commerce. Furthermore, the presence of politically or ideologically motivated attacks—such as the targeting of nuclear research facilities, emergency medical infrastructure, and intelligence agencies—demonstrates that cyber operations remain a critical tool for geopolitical disruption.
Detected Incidents Draft Data
- Alleged unauthorized access to USA and Israel Intelligence Agency
Category: Initial Access
Content: The group claims to have gained unauthorized access to CIA, Mossad and Israels Unit 8200.
Date: 2026-03-14T23:58:30Z
Network: telegram
Published URL: https://t.me/c/2869875394/368
Screenshots:
None
Threat Actors: We are MONARCH
Victim Country: Israel
Victim Industry: Government Administration
Victim Organization: cia
Victim Site: cia.gov - INDOHAXSEC targets the website of LearnLane
Category: Defacement
Content: The group claims to have defaced the website of LearnLane
Date: 2026-03-14T23:44:42Z
Network: telegram
Published URL: https://t.me/IndoHaxSec3/73
Screenshots:
None
Threat Actors: INDOHAXSEC
Victim Country: USA
Victim Industry: Education
Victim Organization: learnlane
Victim Site: learnlane.us - Alleged Data Breach of Coopsana
Category: Data Breach
Content: Threat Actor claims to have breached the database allegedly belonging to Coopsana (coopsana.com.co) in Colombia. The dataset reportedly contains 1.1 million records, including patient information such as names, phone numbers, email addresses, identification numbers, and medical appointment details.
Date: 2026-03-14T20:59:28Z
Network: openweb
Published URL: https://xforums.st/threads/co-1-1-million-coopsana-com-co.534056/
Screenshots:
None
Threat Actors: NyxarGroup
Victim Country: Colombia
Victim Industry: Hospital & Health Care
Victim Organization: coopsana
Victim Site: coopsana.com.co - Alleged Data Leak of Indonesian Forestry Service
Category: Data Breach
Content: The group claims to have leaked the employment details of officials which includes the names, professional titles, id numbers, phone numbers, and status of Indonesian Forestry Service.
Date: 2026-03-14T19:31:03Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/189
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Indonesia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - test
Category: Alert
Content: test
Date: 2026-03-14T16:55:22Z
Network: Unknown
Published URL:
Screenshots:
None
Threat Actors: Unknown
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of French Database
Category: Data Breach
Content: The threat actor claims to have leaked a French dataset containing approximately 817,000 records. the dataset allegedly includes over 726,000 email addresses, phone numbers, IP addresses, and personal details.
Date: 2026-03-14T16:28:23Z
Network: openweb
Published URL: https://breachforums.as/Thread-COLLECTION-FR-800k-lines
Screenshots:
None
Threat Actors: admmonero
Victim Country: France
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of CGFI
Category: Data Breach
Content: The threat actor claims to have leaked the database of CGFI. the data exposed over 800,000 records containing personally identifiable information (PII) along with more than 40,000 financial documents and internal corporate files. the dataset including fields such as usernames, names, company details, addresses, email addresses, phone numbers, and various internal system attributes.
Date: 2026-03-14T15:58:00Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-CGFI-cgfi-com
Screenshots:
None
Threat Actors: max987
Victim Country: USA
Victim Industry: Financial Services
Victim Organization: cgfi
Victim Site: cgfi.com - Alleged data breach of Security Service of Ukraine (SBU)
Category: Data Breach
Content: The threat actor claims to have leaked personal and professional information of officials associated with the Security Service of Ukraine (SBU). The data allegedly contains detailed personal data, including names, dates of birth, places of birth, passport details, phone numbers, addresses, employment history, and other background information of multiple individuals linked to Ukrainian security authorities.
Date: 2026-03-14T15:52:57Z
Network: openweb
Published URL: https://breachforums.as/Thread-DOCUMENTS-sbu-authorities
Screenshots:
None
Threat Actors: brass
Victim Country: Ukraine
Victim Industry: Government & Public Sector
Victim Organization: security service of ukraine (sbu)
Victim Site: ssu.gov.ua - Alleged sale of unauthorized access to Exploit Forum platform
Category: Initial Access
Content: A threat actor sale an account on the Exploit Forum platform. the account allegedly has full access, OG status and an active paid subscription.
Date: 2026-03-14T15:40:22Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-Exploit-Forum-Account-PAID-OG
Screenshots:
None
Threat Actors: Jaxx
Victim Country: Unknown
Victim Industry: Social Media & Online Social Networking
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized Magento Access in Australia
Category: Initial Access
Content: The threat actor claims to be selling Magento CMS access in Australia, stating that the site recorded 20 orders for the period 14.02–14.03.
Date: 2026-03-14T15:38:21Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278313/
Screenshots:
None
Threat Actors: Malwareboy
Victim Country: Australia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized Magento Access in Germany
Category: Initial Access
Content: The threat actor claims to be selling Magento CMS access in Germany, stating that the site recorded 42 orders for the period 02/14–03/14.
Date: 2026-03-14T15:30:01Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278312/
Screenshots:
None
Threat Actors: Malwareboy
Victim Country: Germany
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized Admin Access to WriterBay
Category: Initial Access
Content: A threat actor claims to be selling administrative access to the WriterBay platform.
Date: 2026-03-14T15:14:01Z
Network: openweb
Published URL: https://darkforums.su/Thread-admin-writerbay-com-%E2%AD%90-Access
Screenshots:
None
Threat Actors: AshleyWood2022
Victim Country: Ukraine
Victim Industry: E-Learning
Victim Organization: writerbay
Victim Site: writerbay.com - Alleged Sale of Unauthorized Admin Access to PR.com
Category: Initial Access
Content: A threat actor claims to be offering access to the admin panel of the PR.com website.
Date: 2026-03-14T15:08:33Z
Network: openweb
Published URL: https://darkforums.su/Thread-admin-pr-com-%E2%AD%90-Access
Screenshots:
None
Threat Actors: AshleyWood2022
Victim Country: USA
Victim Industry: Marketing, Advertising & Sales
Victim Organization: pr.com
Victim Site: pr.com - Alleged Sale of Unauthorized Admin Panel Access to TruyenAudioCV
Category: Initial Access
Content: A threat actor claims to be selling admin panel access to the TruyenAudioCV website.
Date: 2026-03-14T15:04:24Z
Network: openweb
Published URL: https://darkforums.su/Thread-truyenaudiocv-net-admin-login-%E2%AD%90-Access
Screenshots:
None
Threat Actors: AshleyWood2022
Victim Country: Vietnam
Victim Industry: Entertainment & Movie Production
Victim Organization: truyenaudiocv
Victim Site: truyenaudiocv.net - Alleged Sale of Unauthorized Admin Access to CPAGrip
Category: Initial Access
Content: A threat actor claims to be selling admin access to the CPAGrip website.
Date: 2026-03-14T14:57:18Z
Network: openweb
Published URL: https://darkforums.su/Thread-www-cpagrip-com-%E2%AD%90-access
Screenshots:
None
Threat Actors: AshleyWood2022
Victim Country: USA
Victim Industry: Marketing, Advertising & Sales
Victim Organization: cpagrip
Victim Site: cpagrip.com - Alleged Sale of Unauthorized Root Access to Mexican company
Category: Initial Access
Content: The threat actor claims to be selling root access and 190 GB of data belonging to a Mexico-based company. The compromised data reportedly includes invoices, payments, receipts, access control systems, cash desk records, employee management data, inventory information, fuel card replenishment records, detailed employee data (including photos), customer data, and more.
Date: 2026-03-14T14:31:58Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278294/
Screenshots:
None
Threat Actors: izgoi
Victim Country: Mexico
Victim Industry: Manufacturing
Victim Organization: Unknown
Victim Site: Unknown - Alleged data sale of the French Federation of Canoe Kayak and Paddle Sports
Category: Data Breach
Content: The threat actor claims to be selling the data of 393,374 members from the French Federation of Canoe Kayak and Paddle Sports, with records reportedly spanning from 1995 to 2026. The exposed data allegedly includes names, addresses, phone numbers, email addresses, birth details, and more.
Date: 2026-03-14T14:29:49Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-FR-F%C3%A9d%C3%A9ration-Fran%C3%A7aise-de-Cano%C3%AB-Kayak
Screenshots:
None
Threat Actors: HexDex
Victim Country: France
Victim Industry: Sports
Victim Organization: french federation of canoe kayak and paddle sports
Victim Site: ffck.org - Alleged cyberattack on TEREM Emergency Medical Centers
Category: Cyber Attack
Content: The threat actor claims to have conducted a cyber operation targeting the surveillance camera control centers of TEREM Emergency Medical Centers. The group alleges that the intrusion affected monitoring infrastructure associated with the medical network, which provides urgent care services such as non-critical emergency treatment, rapid medical examinations, and radiology and laboratory services.
Date: 2026-03-14T14:26:50Z
Network: telegram
Published URL: https://t.me/CIR48/1740
Screenshots:
None
Threat Actors: Cyber Islamic resistance
Victim Country: Israel
Victim Industry: Hospital & Health Care
Victim Organization: terem emergency medical centers
Victim Site: terem.com - Alleged data breach of NotaryStars
Category: Data Breach
Content: The threat actor claims to have breached the data of over 112,652 users from NotaryStars(Jan 2025). The exposed data allegedly includes user information, contact details, authentication data, and account records.
Date: 2026-03-14T14:26:45Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-Notarystars-com-112k
Screenshots:
None
Threat Actors: cachecat
Victim Country: USA
Victim Industry: Real Estate
Victim Organization: notarystars
Victim Site: notarystars.com - Alleged Sale of Compromised Magento Store Orders
Category: Initial Access
Content: The threat actor claims to be offering access to a compromised Magento-based e-commerce store, allegedly utilizing an iframe injection targeting Stripe payment pages. The data pertains to customers from Ireland (IE) and includes approximately 70 orders collected between 14 February and 14 March.
Date: 2026-03-14T14:25:28Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278311/
Screenshots:
None
Threat Actors: Malwareboy
Victim Country: Ireland
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized Admin Access to Brazil based company
Category: Initial Access
Content: The threat actor claims to be selling administrative access to a Brazil based company.
Date: 2026-03-14T14:21:45Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278297/
Screenshots:
None
Threat Actors: Big-Bro
Victim Country: Brazil
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of RDP/Domain Admin Access to South African Insurance Company Network
Category: Initial Access
Content: The threat actor claims to be selling Remote Desktop Protocol (RDP) and shell access to the network of a South Africa–based insurance organization. According to the post, the access allegedly includes Domain Admin and SYSTEM-level privileges across more than 90 hosts, with antivirus protections reportedly disabled. The actor further claims the presence of approximately 1.5 TB of critical insurance-related data, along with over 11 TB of backups stored on NAS systems, and administrative control over a Hyper-V environment capable of managing all workstations.
Date: 2026-03-14T14:20:33Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278308/
Screenshots:
None
Threat Actors: Saturned33
Victim Country: South Africa
Victim Industry: Insurance
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of sophos VPN and domain user data from an unidentified Slovakia-Based Organization
Category: Data Breach
Content: The threat actor claims to be selling a dataset allegedly linked to an unidentified organization in Slovakia, indicating that the data purportedly contains Sophos VPN credentials and domain user information.
Date: 2026-03-14T14:18:27Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278299/
Screenshots:
None
Threat Actors: Big-Bro
Victim Country: Slovakia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized access to an RDP
Category: Initial Access
Content: The threat actor claims to have gained unauthorized access to an RDP
Date: 2026-03-14T14:10:46Z
Network: openweb
Published URL: https://breachforums.as/Thread-RDP–191445
Screenshots:
None
Threat Actors: BSeller
Victim Country: China
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data sale of CURP.mx
Category: Data Breach
Content: The threat actor claims to be selling a CURP.mx database allegedly containing 390 records of Mexican citizen information, including first and last names, second last names, date of birth, gender, registration year, page, volume and more
Date: 2026-03-14T14:10:15Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-curp-mx-db
Screenshots:
None
Threat Actors: formousny
Victim Country: Mexico
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: curp.mx - Alleged Sale of Telecommunications Network Access in Kuwait
Category: Initial Access
Content: The threat actor claims to be selling administrative access to a telecommunications organization based in Kuwait, allegedly obtained through a FortiVPN service.
Date: 2026-03-14T14:06:05Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278298/
Screenshots:
None
Threat Actors: Big-Bro
Victim Country: Kuwait
Victim Industry: Network & Telecommunications
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of admin access of National University of Cuyo
Category: Initial Access
Content: The threat actor claims to be selling admin access to an National University of Cuyo.
Date: 2026-03-14T13:55:05Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-Universidad-Nacional-de-Cuyo-uncuyo-edu-ar-Argentina
Screenshots:
None
Threat Actors: blackwinter99
Victim Country: Argentina
Victim Industry: Education
Victim Organization: national university of cuyo
Victim Site: uncuyo.edu.ar - Alleged sale of unauthorized corporate database access to an unidentified Indian construction company
Category: Initial Access
Content: The threat actor claims to be selling unauthorized corporate database access to an unidentified Indian construction company, allegedly including Administrator and root access. The compromised data reportedly contains 44GB of information.
Date: 2026-03-14T13:51:41Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-ACCESS-DB-1billion-revenue-Company
Screenshots:
None
Threat Actors: XSSRAT
Victim Country: India
Victim Industry: Building and construction
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized access to cPanels
Category: Initial Access
Content: The threat actor claims to be selling cPanel access panels, allegedly offering regular updates and stating that more than 1,000 cPanel accounts are available.
Date: 2026-03-14T13:41:01Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-Selling-Cpanel
Screenshots:
None
Threat Actors: pulsar77
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of TheDivideGolfClub
Category: Data Breach
Content: The threat actor claims to have breached 23,901 users’ data from TheDivideGolfClub, allegedly containing names, phone numbers, email addresses, physical addresses, birth dates, usernames, and internal IDs. The data was allegedly breached in July 2024.
Date: 2026-03-14T13:02:41Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Thedividegolfclub-com-24k
Screenshots:
None
Threat Actors: cachecat
Victim Country: USA
Victim Industry: Sports
Victim Organization: the divide golf club
Victim Site: thedividegolfclub.com - Alleged sale of unauthorized access to an Australian logistics provider
Category: Initial Access
Content: The threat actor claims to be selling unauthorized access to an Australian logistics provider.
Date: 2026-03-14T12:55:05Z
Network: openweb
Published URL: https://breachforums.as/Thread-Australian-Logistics-Provider-4B-Revenue
Screenshots:
None
Threat Actors: 2019
Victim Country: Australia
Victim Industry: Transportation & Logistics
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of low-authority websites list
Category: Cyber Attack
Content: The group claims to be selling a list of low-authority websites likely intended for use in future cyberattacks.
Date: 2026-03-14T12:48:00Z
Network: telegram
Published URL: https://t.me/phteammarket/350
Screenshots:
None
Threat Actors: Pharaohs Team market
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of login credentials to Jeevan Scientific Technology Limited
Category: Initial Access
Content: The group claims to have leaked login credentials to Jeevan Scientific Technology Limited.
Date: 2026-03-14T12:45:12Z
Network: telegram
Published URL: https://t.me/silenterrorsystem/137
Screenshots:
None
Threat Actors: SILENT ERROR SYSTEM
Victim Country: India
Victim Industry: Research Industry
Victim Organization: jeevan scientific technology limited
Victim Site: jeevanscientific.com - Hax.or targets the website of Indonesian Womens Empowerment Forum (FPPI)
Category: Defacement
Content: The group claims to have defaced the website of Indonesian Womens Empowerment Forum (FPPI).
Date: 2026-03-14T12:36:20Z
Network: openweb
Published URL: https://fppi.or.id/berita.php
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Indonesia
Victim Industry: Non-profit & Social Organizations
Victim Organization: indonesian womens empowerment forum (fppi)
Victim Site: fppi.or.id - DEFACER INDONESIAN TEAM targets the website of Price in Turkey
Category: Defacement
Content: The group claims to have defaced the website of Price in Turkey.
Date: 2026-03-14T12:20:56Z
Network: telegram
Published URL: https://t.me/c/2433981896/1265
Screenshots:
None
Threat Actors: DEFACER INDONESIAN TEAM
Victim Country: Turkey
Victim Industry: Online Publishing
Victim Organization: price in turkey
Victim Site: priceinturkey.com - Alleged data breach of Fargo
Category: Data Breach
Content: The threat actor claims to have breached the Fargos database (Oct 31, 2024), containing 980,000 rows (CSV) with sensitive info: names, phone numbers, addresses, emails, and passport details.
Date: 2026-03-14T11:45:34Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Fargo-uz-2024-leak
Screenshots:
None
Threat Actors: Tanaka
Victim Country: Uzbekistan
Victim Industry: Transportation & Logistics
Victim Organization: fargo parcel service fv llc
Victim Site: fargo.uz - Alleged data breach of A.R. Refael Trade Ltd
Category: Data Breach
Content: Group claims to have deleted 1TB of data from the systems of A.R. Refael Trade Ltd.
Date: 2026-03-14T11:41:07Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/29
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Textiles
Victim Organization: a.r. refael trade ltd
Victim Site: Unknown - Alleged data leak exposing Israeli Navy officers
Category: Data Breach
Content: The threat actor claims to have leaked personal information of 50 senior officers associated with the Israeli Navy. According to the claim, the exposed data allegedly includes names, photographs, ranks, home addresses, and personal phone numbers of the officers.
Date: 2026-03-14T11:32:53Z
Network: openweb
Published URL: https://handala-hack.to/no-place-to-hide-senior-navy-officers-identities-now-public/
Screenshots:
None
Threat Actors: Handala Hack
Victim Country: Israel
Victim Industry: Military Industry
Victim Organization: israeli navy
Victim Site: Unknown - Alleged data leak of CASINOVALE
Category: Data Breach
Content: The threat actor claims to have leaked the database of Casinovale(Turkish gambling platform), exposing 554,009 users data including names, birth dates, phone numbers, and last login IPs.
Date: 2026-03-14T11:21:23Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-554-009-USER-TURKISH-CASINOVALE-DATABASE
Screenshots:
None
Threat Actors: LockBitData
Victim Country: Turkey
Victim Industry: Gambling & Casinos
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of ZARAH WINE
Category: Data Breach
Content: The group claims to have breached the database of ZARAH WINE.
Date: 2026-03-14T10:27:12Z
Network: telegram
Published URL: https://t.me/c/3772103374/3300
Screenshots:
None
Threat Actors: Whale Hunters Groups
Victim Country: Switzerland
Victim Industry: Food & Beverages
Victim Organization: zarah wine
Victim Site: zarahwine.com - Alleged data leak of Nintusoft
Category: Data Breach
Content: The group claims to be leaked data from Nintusoft.
Date: 2026-03-14T10:13:00Z
Network: telegram
Published URL: https://t.me/c/3772103374/3298
Screenshots:
None
Threat Actors: Whale Hunters Groups
Victim Country: Turkey
Victim Industry: Information Technology (IT) Services
Victim Organization: nintusoft
Victim Site: nintusoft.com - BABAYO EROR SYSTEM targets the website of verylikely.svalphawp.com
Category: Defacement
Content: The group claims to have defaced the website of verylikely.svalphawp.com
Date: 2026-03-14T09:16:33Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/159
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: verylikely.svalphawp.com - BABAYO EROR SYSTEM targets the website of wisdomcoaching.svalphawp.com
Category: Defacement
Content: The group claims to have defaced the website of wisdomcoaching.svalphawp.com.
Date: 2026-03-14T09:05:56Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/158
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: wisdomcoaching.svalphawp.com - Alleged data breach of Discord Inc.
Category: Data Breach
Content: The threat actor claims to have breached four Discord databases allegedly containing over 1 million logs of sensitive user information, including IP addresses, email addresses, phone numbers, and additional personal data.
Date: 2026-03-14T09:04:14Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Discord-Databases-1M
Screenshots:
None
Threat Actors: ozzy0xd
Victim Country: USA
Victim Industry: Social Media & Online Social Networking
Victim Organization: discord inc.
Victim Site: discord.com - BABAYO EROR SYSTEM targets the website of qualit.ro.thestrategy.ro
Category: Defacement
Content: The group claims to have defaced the website of qualit.ro.thestrategy.ro
Date: 2026-03-14T08:25:26Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/154
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: qualit.ro.thestrategy.ro - BABAYO EROR SYSTEM targets the website of afporto.inscricao.pt
Category: Defacement
Content: The group claims to have defaced the website of afporto.inscricao.pt
Date: 2026-03-14T08:18:29Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/154
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Portugal
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: afporto.inscricao.pt - BABAYO EROR SYSTEM targets the website of s4agro.inscricao.pt
Category: Defacement
Content: The group claims to have defaced the website of s4agro.inscricao.pt
Date: 2026-03-14T08:11:31Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/154
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Portugal
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: s4agro.inscricao.pt - BABAYO EROR SYSTEM targets the website of KAREN BARROS INSTITUTE LTD
Category: Defacement
Content: The group claims to have defaced the website of KAREN BARROS INSTITUTE LTD.
Date: 2026-03-14T08:10:52Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/154
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Brazil
Victim Industry: Health & Fitness
Victim Organization: karen barros institute ltd
Victim Site: karenbarros.com.br - BABAYO EROR SYSTEM targets the website of sinhpv89.me.ranjapancosmetic.com
Category: Defacement
Content: The group claims to have defaced the website of sinhpv89.me.ranjapancosmetic.com
Date: 2026-03-14T08:08:22Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/154
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: sinhpv89.me.ranjapancosmetic.com - BABAYO EROR SYSTEM targets the website of Frontier Land Holdings LLC
Category: Defacement
Content: The group claims to have defaced the website of Frontier Land Holdings LLC.
Date: 2026-03-14T08:03:01Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/155
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: USA
Victim Industry: Real Estate
Victim Organization: frontier land holdings llc
Victim Site: frontierlandholdingsllc.svalphawp.com - BABAYO EROR SYSTEM targets the website of Luna Clothing Store
Category: Defacement
Content: The group claims to have defaced the website of Luna Clothing Store.
Date: 2026-03-14T07:53:07Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/154
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Fashion & Apparel
Victim Organization: luna clothing store
Victim Site: violetclothingstore.lunaclothingstore.site - Hax.or targets the website of Imperial Technical Institute
Category: Defacement
Content: The group claims to have defaced the website of Imperial Technical Institute.
Date: 2026-03-14T07:45:18Z
Network: telegram
Published URL: https://t.me/ctifeeds/129174
Screenshots:
None
Threat Actors: Hax.or
Victim Country: India
Victim Industry: Education
Victim Organization: imperial technical institute
Victim Site: itirawanwadi.in - BABAYO EROR SYSTEM targets the website of Astron Hosts
Category: Defacement
Content: The group claims to have defaced the website of Astron Hosts.
Date: 2026-03-14T07:28:23Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/142
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: UAE
Victim Industry: Information Technology (IT) Services
Victim Organization: astron hosts
Victim Site: portfolios.astronhosts.com - BABAYO EROR SYSTEM targets the website of beta.dphq.ro
Category: Defacement
Content: The group claims to have defaced the website of beta.dphq.ro
Date: 2026-03-14T07:14:18Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/153
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Romania
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: beta.dphq.ro - BABAYO EROR SYSTEM targets the website of compassautoglass.svalphawp.com
Category: Defacement
Content: The group claims to have defaced the website of compassautoglass.svalphawp.com.
Date: 2026-03-14T06:47:36Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/152
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: compassautoglass.svalphawp.com - Alleged leak of Chinese Forex Traders Database
Category: Data Breach
Content: The threat actor claims to have leaked a 45K Chinese Forex Traders Database.
Date: 2026-03-14T06:37:50Z
Network: telegram
Published URL: https://t.me/DedaleOffice/666
Screenshots:
None
Threat Actors: Dedale Office
Victim Country: China
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of PTK Kab Probolinggo Database
Category: Data Breach
Content: The threat actor claims to have breached the database of PTK Kab Probolinggo, the dataset reportedly contains records related to education staff and personnel information associated with the regional administration.
Date: 2026-03-14T06:30:26Z
Network: openweb
Published URL: https://breachforums.as/Thread-DUMP-Database-PTK-Kab-Probolinggo
Screenshots:
None
Threat Actors: kyyzo
Victim Country: Indonesia
Victim Industry: Government Relations
Victim Organization: ptk kab probolinggo
Victim Site: probolinggokab.go.id - Hax.or targets the website of Pinturas Héctor Alviarez
Category: Defacement
Content: The group claims to have defaced the website of Pinturas Hector Alviarez.
Date: 2026-03-14T06:22:45Z
Network: telegram
Published URL: https://t.me/ctifeeds/129170
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Spain
Victim Industry: Building and construction
Victim Organization: pinturas hector alviarez
Victim Site: hectoralvarezpinturas.es - Hax.or targets the website of DiPatrizio Hostelería
Category: Defacement
Content: The group claims to have defaced the website of DiPatrizio Hostelería .
Date: 2026-03-14T06:17:56Z
Network: telegram
Published URL: https://t.me/ctifeeds/129169
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Spain
Victim Industry: Hospitality & Tourism
Victim Organization: dipatrizio hostelería
Victim Site: hosteleriadipatrizio.es - Alleged Data Breach of DISKOMINFO Mentawai
Category: Data Breach
Content: The threat actor claims to have breached the database allegedly containing employee information related to DISKOMINFO Mentawai.
Date: 2026-03-14T06:17:20Z
Network: openweb
Published URL: https://breachforums.as/Thread-DUMP-Database-Pegawai-DISKOMINFO-40-Records
Screenshots:
None
Threat Actors: kyyzo
Victim Country: Indonesia
Victim Industry: Government Relations
Victim Organization: diskominfo mentawai
Victim Site: diskominfo.mentawaikab.go.id - Hax.or targets the website of Ogenix
Category: Defacement
Content: The group claims to have defaced the website of Ogenix.
Date: 2026-03-14T06:10:12Z
Network: telegram
Published URL: https://t.me/ctifeeds/129168
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Spain
Victim Industry: Food & Beverages
Victim Organization: ogenix
Victim Site: jimenezcomerciante.es - BABAYO EROR SYSTEM targets the website of formistweb.co.kr
Category: Defacement
Content: The group claims to have defaced the website of temp3.formistweb.co.kr
Date: 2026-03-14T05:31:11Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/142
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: South Korea
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: temp3.formistweb.co.kr - Alleged Sale of PLA Officer Records
Category: Data Breach
Content: The threat actor claims to be selling records allegedly belonging to PLA officers.
Date: 2026-03-14T05:29:51Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-CHINA-PLA-BREACH-EXPOSES-SENSITIVE-DATA
Screenshots:
None
Threat Actors: ModernStealer
Victim Country: China
Victim Industry: Military Industry
Victim Organization: peoples liberation army (pla)
Victim Site: mod.gov.cn - Alleged data breach of MyComplianceOffice
Category: Data Breach
Content: The threat actor claims to be leaked data from MyComplianceOffice. The compromised data reportedly includes MongoDB production database dumps, 395,000 email archive files, Microsoft Teams messages, trader mobile text messages, meeting transcripts, and user account records, some allegedly containing plaintext passwords.
Date: 2026-03-14T05:26:12Z
Network: openweb
Published URL: https://breachforums.as/Thread-FRESH-BREACH-MyComplianceOffice-MAJOR-FIRMS-CONFIDENTIAL-COMMS-EXPOSED
Screenshots:
None
Threat Actors: FulcrumSec
Victim Country: Canada
Victim Industry: Software Development
Victim Organization: mycomplianceoffice
Victim Site: mycomplianceoffice.com - Hax.or targets the website of Real Estate Indonesia (REI).
Category: Defacement
Content: The group claims to have defaced the website of Real Estate Indonesia (REI).
Date: 2026-03-14T05:11:18Z
Network: telegram
Published URL: https://t.me/ctifeeds/129166
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Indonesia
Victim Industry: Real Estate
Victim Organization: real estate indonesia (rei)
Victim Site: evoting.rei.or.id - BABAYO EROR SYSTEM targets the website of Clearwaters Counselling & Life Coaching
Category: Defacement
Content: The group claims to have defaced the website of Clearwaters Counselling & Life Coaching.
Date: 2026-03-14T05:11:00Z
Network: telegram
Published URL: https://t.me/c/3865526389/149
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Singapore
Victim Industry: Hospital & Health Care
Victim Organization: clearwaters counselling & life coaching
Victim Site: clearwaters.svalphawp.com - BABAYO EROR SYSTEM targets the website of music.itsme.cfd
Category: Defacement
Content: The group claims to have defaced the website of music.itsme.cfd .
Date: 2026-03-14T05:10:27Z
Network: telegram
Published URL: https://t.me/c/3865526389/142
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: music.itsme.cfd - Alleged Data Breach of Mideast
Category: Data Breach
Content: The threat actor claims to have breached the database of Mideast, the dataset contains sensitive personal, financial, and vehicle-related information, including user identities, contact details, banking and payment data, account credentials, and other associated records
Date: 2026-03-14T04:55:59Z
Network: openweb
Published URL: https://darkforums.su/Thread-Mideast-com-sa-Saudi-Arabia-Application-Data
Screenshots:
None
Threat Actors: Anonymous2090
Victim Country: Saudi Arabia
Victim Industry: Automotive
Victim Organization: mideast
Victim Site: mideast.com.sa - BABAYO EROR SYSTEM targets the website of Amandi Law
Category: Defacement
Content: The group claims to have defaced the website of Amandi Law.
Date: 2026-03-14T04:54:30Z
Network: telegram
Published URL: https://t.me/c/3865526389/143
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Canada
Victim Industry: Legal Services
Victim Organization: amandi law
Victim Site: bawku260.svalphawp.com - Hax.or targets the website of Las Variedades de Ali
Category: Defacement
Content: The group claims to have defaced the website of Las Variedades de Ali.
Date: 2026-03-14T04:52:54Z
Network: telegram
Published URL: https://t.me/ctifeeds/129166
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Spain
Victim Industry: Food & Beverages
Victim Organization: las variedades de ali
Victim Site: lasvariedadesdeali.es - Hax.or targets the website of ferlinofficial.com
Category: Defacement
Content: The group claims to have defaced the website of ferlinofficial.com
Date: 2026-03-14T04:47:43Z
Network: telegram
Published URL: https://t.me/ctifeeds/129161
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: ferlinofficial.com - Alleged data breach of Camelot Electronics Technology Co., Ltd
Category: Data Breach
Content: The threat actor claims to be leaked 84 GB of data from Camelot Electronics Technology Co., Ltd.
Date: 2026-03-14T04:46:59Z
Network: openweb
Published URL: https://breachforums.as/Thread-Camelot-Electronics-Technology-Co-Ltd-camelotpcb-com-84gb-Leak
Screenshots:
None
Threat Actors: Moneyistime
Victim Country: China
Victim Industry: Manufacturing
Victim Organization: camelot electronics technology co., ltd
Victim Site: camelotpcb.com - Alleged data breach of Trucompare
Category: Data Breach
Content: The threat actor claims to have gained access to approximately 785K customer records from TruCompare. The compromised data reportedly includes names, dates of birth, email addresses, phone numbers, and state information of users.
Date: 2026-03-14T04:46:15Z
Network: telegram
Published URL: https://t.me/netstrikegroup/37
Screenshots:
None
Threat Actors: NetStrike
Victim Country: India
Victim Industry: Financial Services
Victim Organization: trucompare
Victim Site: trucompare.in - Hax.or targets the website of Salas Staffing.
Category: Defacement
Content: The group claims to have defaced the website of Salas Staffing.
Date: 2026-03-14T04:43:22Z
Network: telegram
Published URL: https://t.me/ctifeeds/129165
Screenshots:
None
Threat Actors: Hax.or
Victim Country: USA
Victim Industry: Human Resources
Victim Organization: salas staffing
Victim Site: salasstaffing.com - Hax.or targets the website of Salas Records.
Category: Defacement
Content: The group claims to have defaced the website of Salas Records.
Date: 2026-03-14T04:39:59Z
Network: telegram
Published URL: https://t.me/ctifeeds/129164
Screenshots:
None
Threat Actors: Hax.or
Victim Country: USA
Victim Industry: Entertainment & Movie Production
Victim Organization: salas records
Victim Site: salasrecords.com - BABAYO EROR SYSTEM targets the website of ayanjoiya.svalphawp.com
Category: Defacement
Content: The group claims to have defaced the website of ayanjoiya.svalphawp.com
Date: 2026-03-14T04:32:08Z
Network: telegram
Published URL: https://t.me/c/3865526389/140
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: ayanjoiya.svalphawp.com - Hax.or targets the website of Salas Games
Category: Defacement
Content: The group claims to have defaced the website of Salas Games.
Date: 2026-03-14T04:25:59Z
Network: telegram
Published URL: https://t.me/ctifeeds/129163
Screenshots:
None
Threat Actors: Hax.or
Victim Country: USA
Victim Industry: Gaming
Victim Organization: salas games
Victim Site: salasgames.com - Hax.or targets the website of Talented Mr. Salas
Category: Defacement
Content: The group claims to have defaced the website of Talented Mr. Salas .
Date: 2026-03-14T04:18:55Z
Network: telegram
Published URL: https://t.me/ctifeeds/129162
Screenshots:
None
Threat Actors: Hax.or
Victim Country: USA
Victim Industry: Management Consulting
Victim Organization: talented mr. salas
Victim Site: franksalasjr.com - Alleged sale of data from Ministry of Health and Population
Category: Data Breach
Content: The threat actor claims to be selling a database allegedly belonging to the Egypt Ministry of Health and Population, containing approximately 4 million records, including patient names, national ID numbers, phone numbers, addresses, medical procedures, diagnoses, hospital information, and operation details.
Date: 2026-03-14T04:15:14Z
Network: openweb
Published URL: https://darkforums.su/Thread-Egypt-National-health-ministry-Database-for-sell
Screenshots:
None
Threat Actors: aha
Victim Country: Egypt
Victim Industry: Government & Public Sector
Victim Organization: ministry of health and population
Victim Site: mohp.gov.eg - Cyberattack hits National Centre for Nuclear Research, Poland
Category: Cyber Attack
Content: An attempted cyberattack targeted the IT infrastructure of the National Centre for Nuclear Research, Poland. According to the institute, security systems and incident response procedures detected and blocked the intrusion before any systems were compromised. The organization confirmed that the attack did not disrupt production, operational, or research activities, and the MARIA reactor continues to operate safely at full power. The institute stated that it is coordinating with national authorities, including NASK and the Ministry of Digital Affairs, to monitor the situation and maintain the security of critical infrastructure.
Date: 2026-03-14T04:14:19Z
Network: openweb
Published URL: https://www.ncbj.gov.pl/aktualnosci/udaremnienie-cyberataku-na-narodowe-centrum-badan-jadrowych
Screenshots:
None
Threat Actors: Unknown
Victim Country: Poland
Victim Industry: Research Industry
Victim Organization: national centre for nuclear research
Victim Site: ncbj.gov.pl - Alleged Data Breach of O-Design
Category: Data Breach
Content: The threat actor claims to have leaked a database allegedly with O-Design. the dataset contains customers personal details.
Date: 2026-03-14T04:07:00Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-FR-odesign
Screenshots:
None
Threat Actors: admmonero
Victim Country: France
Victim Industry: Design
Victim Organization: o-design
Victim Site: o-design.fr - iraninarabic_ir claims to target multiple U.S. tech companies
Category: Alert
Content: Pro-Iran affiliated channels are circulating graphics warning employees of several U.S. tech companies (Cisco, Palo Alto, Oracle, Salesforce, AWS, Microsoft, Google, IBM, Intel, Apple, Dell, Qualcomm, Adobe) to evacuate offices in Gulf cities including Dubai, Riyadh, Doha, Kuwait City, Manama, and Muscat.The message appears to be psychological warfare / threat messaging.
Date: 2026-03-14T04:05:39Z
Network: openweb
Published URL: https://x.com/iraninarabic_ir/status/2032564910580720038
Screenshots:
None
Threat Actors: iraninarabic_ir
Victim Country: Iran
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of MagicSlides
Category: Data Breach
Content: The threat actor claims to be leaked data from MagicSlides. The compromised data reportedly contain 2.3 million unique user records including User ID, Email addresses, Account IDs, Subscription plan information, Account creation timestamps and more
Date: 2026-03-14T04:02:15Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-MagicSlides-App-Database-Leaked-Download
Screenshots:
None
Threat Actors: Sythe
Victim Country: India
Victim Industry: Education
Victim Organization: magicslides
Victim Site: magicslides.app - Hax.or targets the website of josecarrasco.es
Category: Defacement
Content: The group claims to have defaced the website of josecarrasco.es
Date: 2026-03-14T04:00:07Z
Network: telegram
Published URL: https://t.me/ctifeeds/129167
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Spain
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: josecarrasco.es - Mr. BDKR28 targets the website of Dune Bashing Dubai
Category: Defacement
Content: The group claims to have defaced the website of Dune Bashing Dubai.
Date: 2026-03-14T03:57:11Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41604698?hz=1
Screenshots:
None
Threat Actors: Mr. BDKR28
Victim Country: UAE
Victim Industry: Leisure & Travel
Victim Organization: dune bashing dubai
Victim Site: dubaiadventureplus.ae - Alleged sale of 500 credit card records
Category: Data Breach
Content: Threat actor claims to be selling 500 credit card records from Australia.
Date: 2026-03-14T03:53:09Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278247/
Screenshots:
None
Threat Actors: old_pirat
Victim Country: Australia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - NXBB.SEC claims to target Paññāsāstra University of Cambodia (PUC)
Category: Alert
Content: A recent post by the group indicates that they are targeting Paññāsāstra University of Cambodia (PUC)
Date: 2026-03-14T03:47:35Z
Network: telegram
Published URL: https://t.me/nxbbsec/5166
Screenshots:
None
Threat Actors: NXBB.SEC
Victim Country: Cambodia
Victim Industry: Higher Education/Acadamia
Victim Organization: paññāsāstra university of cambodia
Victim Site: puc.edu.kh - Alleged sale of unauthorized access to unidentified online store
Category: Initial Access
Content: Threat actor claims to be selling unauthorized access to unidentified online store in Singapore.
Date: 2026-03-14T03:47:00Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278226/
Screenshots:
None
Threat Actors: ed1n1ca
Victim Country: Singapore
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Buolkab Government
Category: Data Breach
Content: The threat actor claims to be leaked data from Buolkab Government. The compromised dataset reportedly contains more than 60,000 records.
Date: 2026-03-14T03:41:25Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-FREE-60K-SQL-DB-BUOLKAB-GO-ID
Screenshots:
None
Threat Actors: Maulnism1337
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: buolkab government
Victim Site: buolkab.go.id - Alleged Sale of User Email Database Remote3
Category: Data Breach
Content: The threat actor claims to be selling 46K User Email Database from Remote3.
Date: 2026-03-14T03:38:30Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-Remote3-co-Crypto-Database-46k-emails
Screenshots:
None
Threat Actors: Sythe
Victim Country: USA
Victim Industry: Human Resources
Victim Organization: remote3
Victim Site: remote3.co - Alleged sale of bulk corporate and consumer email lead databases
Category: Data Breach
Content: Threat actor claims to be selling bulk corporate and consumer lead databases, allegedly containing email contacts associated with Office, G Suite, and Gmail accounts, marketed as validated and deliverable for mass mailing campaigns.
Date: 2026-03-14T03:38:25Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278242/
Screenshots:
None
Threat Actors: Spectre6272
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized admin access to unidentified commercial companies
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin access to unidentified restaurant and agriculture organization.
Date: 2026-03-14T03:23:53Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278233/
Screenshots:
None
Threat Actors: someone0717
Victim Country: Brazil
Victim Industry: Restaurants
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Philippine Government Agency.
Category: Data Breach
Content: The threat actor claims to be leaked data from Philippine Government Agency. The compromised data reportedly contains 300 GB records.
Date: 2026-03-14T02:07:10Z
Network: openweb
Published URL: https://breachforums.as/Thread-Philippine-Government-Agency-batch-1-%E2%89%88300Gb
Screenshots:
None
Threat Actors: KurdFemboys
Victim Country: Philippines
Victim Industry: Government & Public Sector
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of HyperHost
Category: Data Breach
Content: The threat actor claims to have gained access to data from Hyper Host. The compromised data reportedly includes logins and password hashes, email addresses, IP addresses of users and servers, full names, and technical information related to servers and connections.
Date: 2026-03-14T01:05:29Z
Network: telegram
Published URL: https://t.me/itarmyofrussianews/345
Screenshots:
None
Threat Actors: IT ARMY OF RUSSIA
Victim Country: Ukraine
Victim Industry: Information Technology (IT) Services
Victim Organization: hyperhost
Victim Site: hyperhost.ua - INDRAMAYU CHAOS SYSTEM targets the website of Fakultas Kedokteran Universitas Islam Bandung
Category: Defacement
Content: The group claims to have defaced the website of Fakultas Kedokteran Universitas Islam Bandung.
Date: 2026-03-14T00:54:46Z
Network: telegram
Published URL: https://t.me/c/3427600175/618
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Higher Education/Acadamia
Victim Organization: fakultas kedokteran universitas islam bandung
Victim Site: fk.unisba.ac.id - Alleged login access to Mijnten Schaats- en Skeelersport
Category: Initial Access
Content: The group claims to have obtained login credentials and attempted to create an administrator account using the username and password.
Date: 2026-03-14T00:28:17Z
Network: telegram
Published URL: https://t.me/c/3800744258/104
Screenshots:
None
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: Netherlands
Victim Industry: Sporting Goods
Victim Organization: mijnten schaats- en skeelersport
Victim Site: mijnten.nl - Alleged Sale of Unauthorized access to cPanel Accounts.
Category: Data Breach
Content: The threat actor claims to be selling unauthorized access to 140 cPanel accounts belonging to multiple hosting providers, including HostGator, o2switch, and Namecheap.
Date: 2026-03-14T00:04:55Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-X140-Cpanel-Access-HostGator-o2switch
Screenshots:
None
Threat Actors: Jaxx
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown