Brand Protection: How to Monitor Threats on the Dark Web? [Guide]

Brand Protection: How to Monitor Threats on the Dark Web? [Guide]

Check out this step-by-step guide to monitoring threats against organizations with our dark web monitoring tool Lunar.

Microsoft Under the Microscope: Is a Patched Windows CVE Safe Now?

Microsoft Under the Microscope: Is a Patched Windows CVE Safe Now?

Despite being patched, CVE-2023-36874 is still mentioned in illicit discussions, here’s what we know.

How to Monitor CVEs on the Dark Web

How to Monitor CVEs on the Dark Web

A quick guide to tracking CVEs and vulnerabilities with our new dark web monitoring tool Lunar.

The Top Supply Chain Risks on the Dark Web

The Top Supply Chain Risks on the Dark Web

Today, a breach into the system of one business can infect its entire supply chain.

Why Dark Web Monitoring is Crucial for Every Business

Why Dark Web Monitoring is Crucial for Every Business

In this new era of automation, dark web monitoring has become more crucial than ever.

The Rising Threat of Post-Exploitation Frameworks on the Dark Web

The Rising Threat of Post-Exploitation Frameworks on the Dark Web

The hype around Exfiltrator-22 on the dark web suggests a disturbing new trend of increasing use of post exploitation framework (PEF)

The Trick Cybercriminals Use to Avoid Detection and How to Overcome It

The Trick Cybercriminals Use to Avoid Detection and How to Overcome It

Threat actors are constantly developing their methods to avoid detection. We reveal one of their tricks and how to overcome it.

Revealed: The Top 10 Paste Sites Used by Cybercriminals in 2023

Revealed: The Top 10 Paste Sites Used by Cybercriminals in 2023

Here’s the full list of paste sites you should be paying attention to in 2023.

Revealed: The Dark Web Risk Score for Top VPN Providers

Revealed: The Dark Web Risk Score for Top VPN Providers

We reveal the dark web risk score of the leading VPN providers.

Behind the PayPal Breach: Credential Stuffing on the Dark Web

Behind the PayPal Breach: Credential Stuffing on the Dark Web

How was credential stuffing used to breach 35K PayPal users?

Yandex Mega Leak: An Insider Attack or Data Breach Attack?

Yandex Mega Leak: An Insider Attack or Data Breach Attack?

Was the Yandex mega leak an insider attack or a data breach attack?

IoT: The Next Top Cyber Threat in 2023

IoT: The Next Top Cyber Threat in 2023

The Internet of Things (IoT) is on many cybercriminal minds in 2023.