Akira Ransomware

Akira Ransomware: Published Over 30 New Victims on their DLS

Akira, a rising ransomware-as-a-service star was discovered in March 2023. Since then its victim count…
Learn more
Coral

Not Your Grandfather’s Hacktivists: How Hacktivism Has Evolved

Fig 1: Crowd Sourcing to campaign against Israel Fig 2: Crowdsourcing to campaign against Russia…
Learn more
Telegram ChANGES SHAKE CYBER CRIMINALS

Telegram Changes Shake Cyber Criminals

Querying the bot yielded no results A threat actor posted a thread in Cracked, a…
Learn more
europe threat landscape

Europe Threat Landscape Report

Critical Alerts by Industry Oct 2021-2024 Compromised Vendor Industry Date Incident Type ServiceNow I.T. and…
Learn more
q3 2024 ransomware report

Ransomware Groups Report 2024 – Q3

In Q1 2024, the ransomware industry was down to 1,048 cases. See why, as well…
Learn more
meow ransomware

Is MEOW Ransomware Getting Its Claws Out?

Figure 1: Buying options on Meow Leaks Figure 2: 'mleaks' user on exploit forum Figure…
Learn more
major x accounts hack fizzles

Major X Accounts Hack Fizzles in Botched Crypto Scam Attempt

Learn more
A deep dive into initial access brokers

A Deep-Dive Into Initial Access Brokers: Trends, Statistics, Tactics and more

Figure 1: United States corporation offered for sale on the underground Figure 6: Average Revenue…
Learn more
hunters ransomware

On The Hunt for Hunters Ransomware: Origins, Victimology and TTPs

Tactics Techniques Discovery T1057 – Process Discovery Defense Evasion T1027 – Obfuscated Files or Information…
Learn more

Meet UULoader: An Emerging and Evasive Malicious Installer.

Figure 1 – UULoader .pdb path. Figure 2 – Executable missing its MZ/PE header. Figure…
Learn more
ransomhub

RansomHub: The New Kid on the Block to Know

Figure 1: RansomHub Data Leak Site Home page Figure 2: RansomHub publishes data of victims…
Learn more
how big is too pic of a password list

How Big is Too Big (Of a Password List)? An Analysis of the RockYou2024 Password Leak

This most recent incarnation of the “RockYou” lists, dubbed “rockyou2024.txt”, has been uploaded. But how…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start