Welcome to Digibase Operations, we are a non-profit research and development organization of security and advanced computer systems. We are an organization devoted to helping the public good. We operate solely from donations.
We are always in need of funding to keep us moving our efforts forward and serving you, our associates, clients the greater Internet community. We're predominantly an organization that operationally is reliant upon donations from the public as to carry us forward given we're a for the public good initative. We find the advertising industry to be unethical and hence incompatible with our mission to provide secure and private services and to be able to service you, thus our decision not to use advertisements and to not provide private information to third parties.
However, over the recent month or so, our upstream provider has made some business decisions, these decisions have made operating for us a much more expensive thing at least in the short term and billing date changes have resulted in a problematic situation for us. We therefore are in desperate need more than ever for donations. We are investigating our options at this point.
To that end, if you could consider donating to us, we would thank you. You may donate via paypal or credit card securely through paypal by the "DONATE TO US" button to the left. We're gracious for any amount you can offer.
Thank you and Securely,
— Kradorex Xeron,
Founder, Executive Director
A New Look...
We are pleased to be announcing our transition to a new logo that preserves our historical angular style, while bringing a modern, futuristic, looking forward feel. The design is heavily influenced by a chevron arrow style that moves your eyes across the logo in a single sweep, emphasizing efficiency and progession, while maintaining a strong, striking look that can fit any application. The new design emphasizes the "Operations" text as it moves it from the bottom in a small space up to having a greater presence.
The new style has three general forms:
At the top left of this article.
(click to enlarge)
|Mains Power Failure|
A limited outage condition has been caused by the failure of a 120VAC breaker. Breaker was unable to be reset.
At approximately 11:27 EST 31 January, external connectivity has been lost to our network.
At approximately 7:00 AM EST on 3 January, a power incident incident occurred at the municipal level that resulted in border gateway equipment damage at our facility. The damage did not impact any of our internal critical systems.
|Upstream connectivity outage|
Starting at approximately 00:29 (12:29 AM) EDT our network has sustained a loss of upstream connectivity.
Full Status Information
- DBSA-2018-092201-RCN Stores Passwords Plaintext2018-09-23T02:16:32Z
- DBSA-2018-073001-Telegram IP Address Range Hijack2018-07-30T17:35:03Z
- DBSA-2017-062701-Petya Ransomware2017-06-27T21:37:19Z
- DBSA-2017-05031-Google/GMail/Docs Account Phishing Scheme2017-05-04T03:46:34Z
- DBSA-2017-02241-Multi-Website/Cloudflare Potential Compromise2017-02-24T07:59:44Z
- DBSA-2016-06021-Teamviewer Compromise2016-06-02T05:35:44Z
- DBSA-2016-05301 Tumblr Compromise2016-05-30T21:50:29Z
- DBSA-2016-05271 Myspace Compromise2016-05-27T21:30:57Z
- DBSA-2015-0006 Lastpass Compromise2015-06-15T21:34:27Z
- DBSA-2015-0005 Sourceforge Download Tampering (Second Advisory)2015-06-15T18:44:53Z
- DBSA-2015-0004 Skype Colon Exploit2015-06-06T06:35:20Z
- DBSA-2015-0003 Hola VPN Considered Malicious2015-05-31T19:25:57Z
- DBSA-2015-0002 Sourceforge Download Tampering2015-05-28T01:06:56Z
- DBSA-2015-0001 Puush.me/Puu.sh Windows Client Compromised Malware Distributed2015-03-30T03:34:11Z
- DBSA-2014-0015 SSL 3.0 Vulnerable - Discontinue Use Immediately2014-10-19T01:00:00Z
- DBSA-2014-0014 Cryptolocker Decryption Available2014-08-07T05:48:28Z
- DBSA-2014-0013 CNET: A Significant Security Risk2014-07-16T05:59:46Z
- DBSA-2014-0012 Online Password Managers Deemed Insecure2014-07-15T06:00:16Z
- DBSA-2014-0011 Truecrypt Regarded Compromised2014-05-30T01:20:43Z
- DBSA-2014-0010 Google Chrome Malware Synchronization2014-04-30T02:34:05Z
- DBSA-2014-0009 Internet Explorer Security (RE Recent 0day)2014-04-30T01:48:14Z
- DBSA-2014-0008 OpenSSL Heartbleed Vulnerability - Server Administrators2014-04-11T14:15:49Z
- DBSA-2014-0007 OpenSSL Heartbleed Vulnerability - End Users2014-04-11T14:07:45Z
- DBSA-2014-0006 GnuTLS TLS/SSL Vulnerability2014-03-06T07:14:14Z
- DBSA-2014-0005 Microsoft Attack Mitigation Toolkit Vulnerability2014-02-24T23:40:48Z
- DBSA-2014-0004 Apple SSL/TLS Vulnerability2014-02-24T22:22:22Z
- DBSA-2014-0003 Valve Anti-Cheat System (VAC) Scans Windows DNS Caches2014-02-17T15:36:58Z
- DBSA-2014-0002 Malware Impersonating FileZilla2014-01-28T18:20:55Z
- DBSA-2014-0001 Yahoo! Advertisement Network Compromise2014-01-06T11:09:46Z
- DBSA-2013-0009 Windows XP Kernel-Mode Zero-Day2013-11-29T23:22:40Z
- DBSA-2013-0008 Cryptolocker Malware Spreading2013-11-15T19:59:34Z
- DBSA-2013-0007 Mail Interception by Linkedin2013-10-25T04:19:12Z
- DBSA-2013-0006 Multiple Global BGP Compromises2013-07-31T05:35:07Z
- DBSA-2013-0005 Multiple Global DNS Compromises2013-06-21T02:09:51Z
- DBSA-2013-0004 Debian-Multimedia repository potential for compromise2013-06-15T06:30:34Z
- DBSA-2013-0003 Microsoft Probing Sites Linked in Skype Chats2013-05-21T20:53:13Z
- DBSA-2013-0002 Skype Chat Security2013-05-21T05:24:16Z
- DBSA-2013-0001 zPanel security practices2013-05-15T22:17:47Z