Mobile Devices: A Growing Target for Cyber Attacks on the Dark Web

Mobile Devices: A Growing Target for Cyber Attacks on the Dark Web

Mobile devices are increasingly targeted by cybercriminals. Learn how dark web monitoring can help you understand and mitigate mobile threats like malware, phishing, and data breaches.

Stealer Logs on the Dark Web: What You Need to Know

Stealer Logs on the Dark Web: What You Need to Know

Here’s how you can monitor stealer logs on the deep and dark web.

The Top 10 Dark Web Marketplaces in 2023

The Top 10 Dark Web Marketplaces in 2023

From Russian Market to STYX Market, these are the illegal marketplaces you should know.

How to Monitor Supply Chain Risks in the Dark Web?

How to Monitor Supply Chain Risks in the Dark Web?

See how cyber analysts can easily track supply chain risks on the dark web with Lunar, our new monitoring tool.

Top 5 Cyberattacks Against Governments on the Deep and Dark Web

Top 5 Cyberattacks Against Governments on the Deep and Dark Web

More governments are becoming prime targets for cybercriminals than ever. Here are 5 of the top cyberattacks they face.

The Rising Threat of Post-Exploitation Frameworks on the Dark Web

The Rising Threat of Post-Exploitation Frameworks on the Dark Web

The hype around Exfiltrator-22 on the dark web suggests a disturbing new trend of increasing use of post exploitation framework (PEF)

The Trick Cybercriminals Use to Avoid Detection and How to Overcome It

The Trick Cybercriminals Use to Avoid Detection and How to Overcome It

Threat actors are constantly developing their methods to avoid detection. We reveal one of their tricks and how to overcome it.

Revealed: The Top 10 Paste Sites Used by Cybercriminals in 2023

Revealed: The Top 10 Paste Sites Used by Cybercriminals in 2023

Here’s the full list of paste sites you should be paying attention to in 2023.

Yandex Mega Leak: An Insider Attack or Data Breach Attack?

Yandex Mega Leak: An Insider Attack or Data Breach Attack?

Was the Yandex mega leak an insider attack or a data breach attack?

The Dark Web in 2022: All You Need to Know About Data Leaks

The Dark Web in 2022: All You Need to Know About Data Leaks

2022 was the year the format of data leak posts was officially transformed.

The Lifecycle of Data Leaks on the Deep and Dark Web

The Lifecycle of Data Leaks on the Deep and Dark Web

What happens to leaked data on the deep and dark web? We have the answers.

Revealed: The Top 10 CVEs on the Dark Web in 2022

Revealed: The Top 10 CVEs on the Dark Web in 2022

Microsoft and Linux are only two of the companies with the most mentioned security vulnerabilities.