Categories

  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
  • Contact
  • Home
  • Contact
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
#1 Source for Cyber Security News, Reports and Threat Intelligence
Categories
  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
  • Cyber Security Videos
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
Home /
Cyber Security /
Suspected 4chan Hack Could Expose Longtime, Anonymous Admins

Suspected 4chan Hack Could Expose Longtime, Anonymous Admins

Apr 15, 2025 08:00 pm Cyber Security 345
Though the exact details of the situation have not been confirmed, community infighting seems to have spilled out in a breach of the notorious image board.

Support the originator by clicking the read the rest link below.
suspected 4chan could expose longtime anonymous admins
  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter
  • Google+
  • Pinterest
  • VK
  • WhatsApp
Read The Rest from the original source
wired.com
A New Kind of Bike Valve?
Prev
A New Kind of Bike Valve?
Virtue AI Attracts $30M Investment to Address Critical AI Deployment Risks
Next
Virtue AI Attracts $30M Investment to Address...

Related News

  • iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals
    iMessage Zero-Click Attacks Suspected in...
  • Cetus Protocol Secures $500K Loan from Sui Foundation to Compensate Hack Victims, Vows Relaunch
    Cetus Protocol Secures $500K Loan from Sui...
  • “Mysterious” $31 Million Bitcoin Donation to Silk Road Founder Ross Ulbricht Suspected to Originate from AlphaBay
    “Mysterious” $31 Million Bitcoin Donation to...
  • Misconfigured HMIs Expose US Water Systems to Anyone with a Browser
    Misconfigured HMIs Expose US Water Systems to...
  • Ukraine strikes Russian bomber-maker with hack attack
    Ukraine strikes Russian bomber-maker with hack...
  • New Linux Vulnerabilities Expose Password Hashes via Core Dumps
    New Linux Vulnerabilities Expose Password...
  • Crypto crooks targeted $244M in May, hack losses down 40% — PeckShield
    Crypto crooks targeted $244M in May, hack...
  • Cetus Protocol Moves Forward with Recovery After Hack
    Cetus Protocol Moves Forward with Recovery...
  • ConnectWise customers get mysterious warning about 'sophisticated' nation-state hack
    ConnectWise customers get mysterious warning...
  • ConnectWise Confirms Hack, “Very Small Number” of Customers Affected
    ConnectWise Confirms Hack, “Very Small Number”...
1 Unusual Toolset Behind Fog Ransomware Prompts Fresh Security Concerns
Unusual Toolset Behind Fog Ransomware Prompts Fresh Security Concerns
The iPad Mini is 20% off, making my favorite portable tablet even easier to recommend
2 The iPad Mini is 20% off, making my favorite portable...
7 Solana ETF hopefuls file S-1s, but more ‘back and forth’ with SEC ahead
3 7 Solana ETF hopefuls file S-1s, but more ‘back and...
Cyber weapons in the Israel-Iran conflict may hit the US
4 Cyber weapons in the Israel-Iran conflict may hit the US
A Rare Bitcoin Signal Is Flashing: Could the Bull Run Just Be Getting Started?
5 A Rare Bitcoin Signal Is Flashing: Could the Bull Run...

Newsletter

Be in Touch


Current News Sources: 60

Information about Cyber Security and Threat Intelligence should spread as fast as possible. Our goal is to collect these sources and place them all in one area for quick reading. If the information is important to the viewer and they want more information, we forward them to the direct source. The more people talking about cyber security and the more people sharing the information, the better!

If you have a resource that should be added, please let us know via the contact form. We will review the information and get back to you.

  • Incident Response Tool List
  • Blue Team Tool List
  • Privacy Policy
All Rights Reserved #1 Source for Cyber Security News, Reports and Threat Intelligence
Powered By The Internet!!!!