Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 30, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 30, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 30, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 30, 2025

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025

      Cyberpunk 2077 sequel enters pre-production as Phantom Liberty crosses 10 million copies sold

      May 30, 2025

      EA has canceled yet another game, shuttered its developer, and started more layoffs

      May 30, 2025

      The Witcher 3: Wild Hunt reaches 60 million copies sold as work continues on The Witcher 4

      May 30, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      How Remix is shaking things up

      May 30, 2025
      Recent

      How Remix is shaking things up

      May 30, 2025

      Perficient at Kscope25: Let’s Meet in Texas!

      May 30, 2025

      Salesforce + Informatica: What It Means for Data Cloud and Our Customers

      May 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025
      Recent

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025

      Cyberpunk 2077 sequel enters pre-production as Phantom Liberty crosses 10 million copies sold

      May 30, 2025

      EA has canceled yet another game, shuttered its developer, and started more layoffs

      May 30, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»UK-Based Digital Signing Platform SigningHub Faces Alleged Source Code Leak

    UK-Based Digital Signing Platform SigningHub Faces Alleged Source Code Leak

    May 9, 2024

    IntelBroker has claimed the SigningHub data leak, impacting the UK-based online document signing and digital signature creation service provider. The breach, reportedly orchestrated by threat actor IntelBroker and disclosed on nuovo BreachForums, shares insights into the operation of the organization. 

    IntelBroker, a known entity in the hacker community, revealed the breach on May 8, 2024, shedding light on an incident that occurred in December 2023. The leaked source code encompasses crucial elements of SigningHub’s infrastructure, including API services, docker container files, certificates, libraries, and other sensitive data. 

    This breach has implications not only for SigningHub but also for its parent company, Ascertia Limited, headquartered in Surrey, United Kingdom.

    Decoding the SigningHub Data Leak Claims

    Source: Dark Web

    The announcement of the SigningHub data breach paints a grim picture of the intrusion and its impact. The post, titled “SigningHub – File Signing SRC Leaked, Download!”, was shared by the threat actor while other users commended the hacker for this intrusion, stating the SigningHub code leak was “another great hit”, “top release” and other words of praise. 

    The Cyber Express has reached out to Ascertia to learn more about this SigningHub data leak. However, at the time of writing this, no official statement or response has been shared. The absence of a response leaves the claims surrounding the SigningHub source code leak unverified, exacerbating concerns among users and stakeholders.

    In an attempt to shed light on the operation associated with the hacker, The Cyber Express reached out to IntelBroker for insights into their motivations and methods. In a recent interview, IntelBroker shared details of their hacking journey, affiliations, and previous exploits, highlighting the scale and sophistication of their operations.

    The IntelBroker Modus Operandi and Recent Attacks

     

    IntelBroker’s track record includes a series of high-profile breaches targeting organizations across various sectors, ranging from aviation and technology to government agencies.

    Notable breaches attributed to IntelBroker include infiltrations at the Los Angeles International Airport, Acuity, General Electric, DC Health Link, and others, each revealing the extent of vulnerabilities in digital infrastructure.

    The alleged breach at SigningHub adds another layer of complexity to the IntelBroker operations as the hacker has claimed multiple data breaches in 2024, highlighting the pressing issue of security.

    The Cyber Express will be closely monitoring the situation and we’ll update this post once we have more information on the SigningHub source code leak or any official confirmation from the organization.

    Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous Article(SOLD) IntelBroker Traded $20K Crypto For Alleged Unauthorized Cybersecurity Company Access
    Next Article Major Changes in NIST Cybersecurity Framework 2.0: Enhancements and Adoption Strategies

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-5367 – “PHPGurukul Online Shopping Portal SQL Injection Vulnerability”

    May 31, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-5016 – Relevanssi WordPress Stored Cross-Site Scripting Vulnerability

    May 31, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Reducing technical debt with Databricks system tables

    Development

    This AI Paper by Snowflake Introduces Arctic-Embed: Enhancing Text Retrieval with Optimized Embedding Models

    Development

    Create/Deploy Azure Kubernetes Service (AKS) Using Terraform Cloud Workspaces

    Development

    Introducing Wake Vision: A High-Quality, Large-Scale Dataset for TinyML Computer Vision Applications

    Development

    Highlights

    CVE-2025-47949 – Samlify SAML Response Signature Wrapping Vulnerability

    May 19, 2025

    CVE ID : CVE-2025-47949

    Published : May 19, 2025, 8:15 p.m. | 2 hours, 33 minutes ago

    Description : samlify is a Node.js library for SAML single sign-on. A Signature Wrapping attack has been found in samlify prior to version 2.10.0, allowing an attacker to forge a SAML Response to authenticate as any user. An attacker would need a signed XML document by the identity provider. Version 2.10.0 fixes the issue.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-3981 – “Wowjoy Internet Doctor Workstation System Remote Unauthorized Access Vulnerability”

    April 27, 2025

    CVE-2025-4327 – MRCMS Cross-Site Request Forgery Vulnerability

    May 6, 2025

    20+ Free Art Deco Fonts for Designers

    December 17, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.