snatch ransomware

Snatch Ransomware: Digital Cat and Mouse

The perpetrators behind Snatch Ransomware have persistently adapted their strategies. See how they have evolved…
Learn more
emerging threat actor tactics

From Transparency to Coercion, Emerging Threat Actor Tactics

Marked shifts in threat actor tactics are evidence of a brazen growth in confidence among…
Learn more
TargetCompany Ransomware AKA Mallox

TargetCompany Ransomware Group AKA Mallox: A Rapid Evolution

TargetCompany AKA Mallox has had 3 main stages of evolution, from its early variants, to…
Learn more
ALPHV Site Taken Down by the FBI

ALPHV Site Taken Down by the FBI

On December 19, 2023, the FBI successfully dismantled one of the ALPHV/BlackCat ransomware sites. Is…
Learn more
Beyond the Mask of Anonymous Sudan

Behind the Mask of Anonymous Sudan: An Analysis

An in depth analysis of Anonymous Sudan, including main targets, TTPs, suspected origins and more.
Learn more
CVE 2023-22518

Critical Confluence Vulnerability – CVE-2023-22518 

All the latest information on CVE-2023-22518 including risk, whether threat actors are exploiting it and…
Learn more
bianlin ransomware

BianLian Ransomware: Victimology and TTPs

We deep dive into the BianLian Ransomware looking at who they target how they target…
Learn more
Israel-Hamas vs Russia-Ukraine

Israel-Hamas vs. Ukraine-Russia War

There are many similarities between the Israel-Hamas war and the Ukraine-Russia war, but there are…
Learn more
From Clicks to Chaos: The Rise of Crowd-Sourced Cyber Attacks 

From Clicks to Chaos: The Rise of Crowd-Sourced Cyber Attacks 

Guerrilla Warfare Tactics are increasingly being used during cyber warfare. See how crowd-sourced cyber attacks…
Learn more
Atlassian releases 4 critical patches

Atlassian Releases Four Critical Patches to Prevent RCE 

Atlassian released software fixes to address 4 critical flaws that, if successfully exploited, could result…
Learn more
the lumma stealer infostealer

The Lumma Stealer InfoStealer: The Details

Lumma Stealer was initially identified in August 2022. Its specifically crafted to illicitly obtain sensitive…
Learn more
the risks of smartphone and mfa usage in organizations

The Risks of Smartphone and MFA Usage in Organizations

Figure 1: Fake MFA apps on Apple App Store
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start