Ransomware Annual Report 2024

2024 annual ransomware report

The long awaited annual ransomware report, shedding light on statistics, trends, emerging groups, leading groups and more.

Continue reading
2024 annual ransomware report

Ransomware Annual Report 2024

The long awaited annual ransomware report, shedding light on statistics, trends, emerging groups, leading groups…
Learn more
cisco data leak

Cisco Data Leak: The Facts on the Ground

On October 14th, prior to the data leak on December 16th, a threat actor known…
Learn more
pig butchering

The Rise of Pig Butchering Scams

Figure 1: FBI report highlights a significant rise in both the number of complaints and…
Learn more
Akira Ransomware

Akira Ransomware: Published Over 30 New Victims on their DLS

Akira, a rising ransomware-as-a-service star was discovered in March 2023. Since then its victim count…
Learn more
Coral

Not Your Grandfather’s Hacktivists: How Hacktivism Has Evolved

Fig 1: Crowd Sourcing to campaign against Israel Fig 2: Crowdsourcing to campaign against Russia…
Learn more
Telegram ChANGES SHAKE CYBER CRIMINALS

Telegram Changes Shake Cyber Criminals

Querying the bot yielded no results A threat actor posted a thread in Cracked, a…
Learn more
europe threat landscape

Europe Threat Landscape Report

Critical Alerts by Industry Oct 2021-2024 Compromised Vendor Industry Date Incident Type ServiceNow I.T. and…
Learn more
q3 2024 ransomware report

Ransomware Groups Report 2024 – Q3

In Q1 2024, the ransomware industry was down to 1,048 cases. See why, as well…
Learn more
meow ransomware

Is MEOW Ransomware Getting Its Claws Out?

Figure 1: Buying options on Meow Leaks Figure 2: 'mleaks' user on exploit forum Figure…
Learn more
major x accounts hack fizzles

Major X Accounts Hack Fizzles in Botched Crypto Scam Attempt

Learn more
A deep dive into initial access brokers

A Deep-Dive Into Initial Access Brokers: Trends, Statistics, Tactics and more

Figure 1: United States corporation offered for sale on the underground Figure 6: Average Revenue…
Learn more
hunters ransomware

On The Hunt for Hunters Ransomware: Origins, Victimology and TTPs

Tactics Techniques Discovery T1057 – Process Discovery Defense Evasion T1027 – Obfuscated Files or Information…
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start