Yandex Mega Leak: An Insider Attack or Data Breach Attack?

Yandex Mega Leak: An Insider Attack or Data Breach Attack?

Was the Yandex mega leak an insider attack or a data breach attack?

IoT: The Next Top Cyber Threat in 2023

IoT: The Next Top Cyber Threat in 2023

The Internet of Things (IoT) is on many cybercriminal minds in 2023.

BreachForums: The Top Dark Web Forum in 2023

BreachForums: The Top Dark Web Forum in 2023

After the closure of Raidforums, BreachForums has emerged as the dark web forum you need to monitor.

The Top 5 Hacker Groups to Watch in 2023

The Top 5 Hacker Groups to Watch in 2023

We rank the top hacking collectives and APT groups on the dark web in 2023.

Drug Trafficking in the Dark Web in 2023

Drug Trafficking in the Dark Web in 2023

Drug trafficking content appears over 17,000 times on dark web platforms every day

The Top Illicit Content Trends on Alternative Social Media in 2022

The Top Illicit Content Trends on Alternative Social Media in 2022

Before 2023 starts, here’s what we learned from monitoring radical content trends on alternative social media in 2022.

The Dark Web in 2022: All You Need to Know About Data Leaks

The Dark Web in 2022: All You Need to Know About Data Leaks

2022 was the year the format of data leak posts was officially transformed.

The Top Ransomware Trends on the Dark Web in 2022

The Top Ransomware Trends on the Dark Web in 2022

From top ransomware groups to their favorite dark web platforms, it’s time to see what you’ve missed in 2022.

Why Should You Monitor Imageboards?

Why Should You Monitor Imageboards?

Learn how monitoring imageboards can help protect companies and organizations.

The Top Ways Hackers Steal Passwords and Post Them on the Dark Web

The Top Ways Hackers Steal Passwords and Post Them on the Dark Web

How do hackers steal passwords how to find stolen passwords on the dark web?

Brand Protection: The Threats Microsoft is Facing in Hacking Forums

Brand Protection: The Threats Microsoft is Facing in Hacking Forums

How can you protect big brands with dark web monitoring? We use Microsoft Windows as a case study.

The Lifecycle of Data Leaks on the Deep and Dark Web

The Lifecycle of Data Leaks on the Deep and Dark Web

What happens to leaked data on the deep and dark web? We have the answers.