cisco data leak

Cisco Data Leak: The Facts on the Ground

On October 14th, prior to the data leak on December 16th, a threat actor known…
Learn more
pig butchering

The Rise of Pig Butchering Scams

Figure 1: FBI report highlights a significant rise in both the number of complaints and…
Learn more
Akira Ransomware

Akira Ransomware: Published Over 30 New Victims on their DLS

Akira, a rising ransomware-as-a-service star was discovered in March 2023. Since then its victim count…
Learn more
Coral

Not Your Grandfather’s Hacktivists: How Hacktivism Has Evolved

Fig 1: Crowd Sourcing to campaign against Israel Fig 2: Crowdsourcing to campaign against Russia…
Learn more
Telegram ChANGES SHAKE CYBER CRIMINALS

Telegram Changes Shake Cyber Criminals

Querying the bot yielded no results A threat actor posted a thread in Cracked, a…
Learn more
europe threat landscape

Europe Threat Landscape Report

Critical Alerts by Industry Oct 2021-2024 Compromised Vendor Industry Date Incident Type ServiceNow I.T. and…
Learn more
q3 2024 ransomware report

Ransomware Groups Report 2024 – Q3

In Q1 2024, the ransomware industry was down to 1,048 cases. See why, as well…
Learn more
meow ransomware

Is MEOW Ransomware Getting Its Claws Out?

Figure 1: Buying options on Meow Leaks Figure 2: 'mleaks' user on exploit forum Figure…
Learn more
major x accounts hack fizzles

Major X Accounts Hack Fizzles in Botched Crypto Scam Attempt

Learn more
A deep dive into initial access brokers

A Deep-Dive Into Initial Access Brokers: Trends, Statistics, Tactics and more

Figure 1: United States corporation offered for sale on the underground Figure 6: Average Revenue…
Learn more
hunters ransomware

On The Hunt for Hunters Ransomware: Origins, Victimology and TTPs

Tactics Techniques Discovery T1057 – Process Discovery Defense Evasion T1027 – Obfuscated Files or Information…
Learn more

Meet UULoader: An Emerging and Evasive Malicious Installer.

Figure 1 – UULoader .pdb path. Figure 2 – Executable missing its MZ/PE header. Figure…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start