π•šπ•Ÿπ••π•šπ•§π•šπ••π•¦π•’π• 𝕓 (@bumbl3r) 's Twitter Profile
π•šπ•Ÿπ••π•šπ•§π•šπ••π•¦π•’π• 𝕓

@bumbl3r

i name pot strains and hack shit

ID: 1277034460232507392

calendar_today28-06-2020 00:23:19

4,4K Tweet

794 Followers

320 Following

Unit 42 (@unit42_intel) 's Twitter Profile Photo

Malicious extension with nearly 1K installs lures AI devs with #MCP branding. Opens remote WebSocket: enabling remote JS execution, captures screenshots and history. #Agentic workflows are now a big attack surface in #BrowserSecurity. Details at bit.ly/4bXvKBH

Malicious extension with nearly 1K installs lures AI devs with #MCP branding. Opens remote WebSocket: enabling remote JS execution, captures screenshots and history. #Agentic workflows are now a big attack surface in #BrowserSecurity. Details at bit.ly/4bXvKBH
Dominic Alvieri (@alvierid) 's Twitter Profile Photo

IcedID malware developer faked his own death to avoid being arrested Ukrainian police officers were bribed to fake his death certificate. He was arrested in December A 2nd IcedID malware developer has also been arrested in Ukraine c/o Catalin Cimpanu na01.safelinks.protection.outlook.com/?url=https%3A%…

IcedID malware developer faked his own death to avoid being arrested

Ukrainian police officers were bribed to fake his death certificate. He was arrested in December

A 2nd IcedID malware developer has also been arrested in Ukraine

c/o <a href="/campuscodi/">Catalin Cimpanu</a>   

na01.safelinks.protection.outlook.com/?url=https%3A%…
t43cr0wl3r (@t43cr0wl3r) 's Twitter Profile Photo

True IP, fresh build. #shinyhunters IP LEAK 91.202.4[.]68 38.69.12[.]23 toolatedhs5dtr2pv6h5kdraneak5gs3sxrecqhoufc5e45edior7mqd[.]onion shinypogk4jjniry5qi7247tznop6mxdrdte2k6pdu5cyo43vdzmrwid[.]onion Dominic Alvieri Dark Web Informer

True IP, fresh build.
#shinyhunters IP LEAK

91.202.4[.]68
38.69.12[.]23

toolatedhs5dtr2pv6h5kdraneak5gs3sxrecqhoufc5e45edior7mqd[.]onion
shinypogk4jjniry5qi7247tznop6mxdrdte2k6pdu5cyo43vdzmrwid[.]onion

<a href="/AlvieriD/">Dominic Alvieri</a> <a href="/DarkWebInformer/">Dark Web Informer</a>
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Police arrests 651 suspects in African cybercrime crackdown - Sergiu Gatlan bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

GangExposed RU (@gangexposed_ru) 's Twitter Profile Photo

πŸ’£ From Zero-Day to Day-Zero: Who was behind LockBitSupp? An independent OSINT investigation reveals a 3-year pattern of activity and vehicle use linking Evgeny Dementyev to the infamous alias. Read the full story πŸ‘‰ justpaste.it/iw99v #LockBit #OSINT

πŸ’£ From Zero-Day to Day-Zero: Who was behind LockBitSupp?

An independent OSINT investigation reveals a 3-year pattern of activity and vehicle use linking Evgeny Dementyev to the infamous alias.

Read the full story πŸ‘‰ justpaste.it/iw99v

#LockBit #OSINT
Dominic Alvieri (@alvierid) 's Twitter Profile Photo

Breaking Las Vegas Wynn Resorts has allegedly been breached by ShinyHunters Over 800K records of personally identifiable information has allegedly been compromised Wynn Las Vegas

Breaking Las Vegas 

Wynn Resorts has allegedly been breached by ShinyHunters

Over 800K records of personally identifiable information has allegedly been compromised <a href="/WynnLasVegas/">Wynn Las Vegas</a>
HackManac (@h4ckmanac) 's Twitter Profile Photo

🚨Cyber Alert ‼️ πŸ‡ΊπŸ‡ΈUnited States - π—ͺπ˜†π—»π—» π—₯π—²π˜€π—Όπ—Ώπ˜π˜€ ShinyHunters hacking group claims to have breached Wynn Resorts. Threat actor: ShinyHunters Sector: Hospitality Data exposure (claimed): 800,000 records Data type: Personal data and employee data Observed: Feb 20, 2026

🚨Cyber Alert ‼️

πŸ‡ΊπŸ‡ΈUnited States - π—ͺπ˜†π—»π—» π—₯π—²π˜€π—Όπ—Ώπ˜π˜€

ShinyHunters hacking group claims to have breached Wynn Resorts.

Threat actor: ShinyHunters
Sector: Hospitality
Data exposure (claimed): 800,000 records
Data type: Personal data and employee data
Observed: Feb 20, 2026
Group-IB Threat Intelligence (@groupib_ti) 's Twitter Profile Photo

#MuddyWater is back with #OperationOlalampo, deploying four new malware families including CHAR – a rust backdoor, GhostFetch – a loader that deploys GhostBackDoor, and HTTP_VIP – a loader and a backdoor. The campaign leverages Telegram bots for C2, exposing real-time

#MuddyWater is back with #OperationOlalampo, deploying four new malware families including CHAR – a rust backdoor, GhostFetch – a loader that deploys GhostBackDoor, and HTTP_VIP – a loader and a backdoor. The campaign leverages Telegram bots for C2, exposing real-time
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

PayPal discloses data breach that exposed user info for 6 months - Sergiu Gatlan bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

Zscaler ThreatLabz (@threatlabz) 's Twitter Profile Photo

Zscaler ThreatLabz has published a technical analysis of APT37's Ruby Jumper campaign, a DPRK-backed attack leveraging Windows LNK files and newly discovered tools: RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, and FOOTWINE. This campaign leverages removable media to enable

Zscaler ThreatLabz has published a technical analysis of APT37's Ruby Jumper campaign, a DPRK-backed attack leveraging Windows LNK files and newly discovered tools: RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, and FOOTWINE. This campaign leverages removable media to enable
Analyst1 (@analyst1) 's Twitter Profile Photo

Our threat actor series returns with a deep dive into ShinyHunters - one of the most persistent data-theft and extortion brands over the past five years. This profile cuts through: β€’ Public breach claims vs verified attribution β€’ Branding vs technical intrusion clusters β€’

Our threat actor series returns with a deep dive into ShinyHunters - one of the most persistent data-theft and extortion brands over the past five years.

This profile cuts through:
β€’ Public breach claims vs verified attribution
β€’ Branding vs technical intrusion clusters
β€’
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Coruna exploit kit is targeting iOS. Coruna leverages 23 exploits against Apple devices running iOS 13-17.2.1. It is being used for espionage, and by financially motivated actors to steal crypto. Update your iOS devices, and learn more about this threat: bit.ly/4rbeltc

Coruna exploit kit is targeting iOS.

Coruna leverages 23 exploits against Apple devices running iOS 13-17.2.1. It is being used for espionage, and by financially motivated actors to steal crypto.

Update your iOS devices, and learn more about this threat: bit.ly/4rbeltc
Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

‼️BREAKING: LeakBase is showing that it has been seized by law enforcement via updated Whois information. There is currently no seizure banner showing.

‼️BREAKING: LeakBase is showing that it has been seized by law enforcement via updated Whois information. There is currently no seizure banner showing.
ZachXBT (@zachxbt) 's Twitter Profile Photo

John Daghita (Lick) was arrested in the Caribbean yesterday as a direct result of my investigation. In late January 2026, I exposed how John stole $ 46M+ in seized crypto assets from the US government by abusing access at CMDSS, his father's company, which held a USMS contract.

John Daghita (Lick) was arrested in the Caribbean yesterday as a direct result of my investigation.

In late January 2026, I exposed how John stole $ 46M+ in seized crypto assets from the US government by abusing access at CMDSS, his father's company, which held a USMS contract.
John Scott-Railton (@jsrailton) 's Twitter Profile Photo

BREAKING: foreign hacker compromised Epstein files held by FBI. Source describes it as cybercriminal. "included combing through certain files pertaining to the Epstein investigation.” Previously all we knew was: there was some sort of breach. By Raphael Satter 1/

BREAKING: foreign hacker compromised Epstein files held by <a href="/FBI/">FBI</a>.

Source describes it as cybercriminal.

"included combing through certain files pertaining to the Epstein investigation.”

Previously all we knew was: there was some sort of breach. By <a href="/razhael/">Raphael Satter</a> 1/