Telegram ChANGES SHAKE CYBER CRIMINALS

Telegram Changes Shake Cyber Criminals

Querying the bot yielded no results A threat actor posted a thread in Cracked, a…
Learn more
europe threat landscape

Europe Threat Landscape Report

Critical Alerts by Industry Oct 2021-2024 Compromised Vendor Industry Date Incident Type ServiceNow I.T. and…
Learn more
q3 2024 ransomware report

Ransomware Groups Report 2024 – Q3

In Q1 2024, the ransomware industry was down to 1,048 cases. See why, as well…
Learn more
meow ransomware

Is MEOW Ransomware Getting Its Claws Out?

Figure 1: Buying options on Meow Leaks Figure 2: 'mleaks' user on exploit forum Figure…
Learn more
major x accounts hack fizzles

Major X Accounts Hack Fizzles in Botched Crypto Scam Attempt

Learn more
A deep dive into initial access brokers

A Deep-Dive Into Initial Access Brokers: Trends, Statistics, Tactics and more

Figure 1: United States corporation offered for sale on the underground Figure 6: Average Revenue…
Learn more
hunters ransomware

On The Hunt for Hunters Ransomware: Origins, Victimology and TTPs

Tactics Techniques Discovery T1057 – Process Discovery Defense Evasion T1027 – Obfuscated Files or Information…
Learn more

Meet UULoader: An Emerging and Evasive Malicious Installer.

Figure 1 – UULoader .pdb path. Figure 2 – Executable missing its MZ/PE header. Figure…
Learn more
ransomhub

RansomHub: The New Kid on the Block to Know

Figure 1: RansomHub Data Leak Site Home page Figure 2: RansomHub publishes data of victims…
Learn more
how big is too pic of a password list

How Big is Too Big (Of a Password List)? An Analysis of the RockYou2024 Password Leak

This most recent incarnation of the “RockYou” lists, dubbed “rockyou2024.txt”, has been uploaded. But how…
Learn more
cve 2024-6387

CVE-2024-6387 – RCE Vulnerability in OpenSSH

A high-severity remote code execution (RCE) vulnerability, CVE-2024-6387, has been discovered in OpenSSH’s server
Learn more
remcos rat

What You Need to Know About Remcos RAT

Remcos is a form of malware presented as legitimate software, purportedly useful for surveillance and…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start