Search Results

dark web
AlgoSec Security Breach Dark Web Cybersecurity

AlgoSec faces security breach as customer data hits dark web

Network security software giant AlgoSec has reportedly fallen victim to a security breach, with a massive database containing customer data and contact records now available for sale on a notorious hacking forum. The cybercriminal, operating under the alias “Ddarknotevil,” claims to have exfiltrated 227GB of customer data and 7,000 rows of contact records from AlgoSec....
Continue Reading
TPLink Dark Web Zero Day RCE

Dark web actor unleashes private 0-Day RCE on TP-Link

On March 2, 2024, a development emerged from the dark web as the notorious underground forum Breach Forums played host to a threat actor dubbed ‘KingKrex69.’ The threat actor posted details about a zero-day vulnerability exploit targeting TP-Link, a renowned Chinese provider specialising in network communication, consumer electronics, and video surveillance solutions. KingKrex69’s post revealed...
Continue Reading
Dark Web Data Theft Malware ExelaStealer Hackers

ExelaStealer, a data theft malware circulating the dark web

The new ExelaStealer malware is the latest data theft tool that emerged in the digital underworld several months ago. Based on reports, it contains various data-stealing capabilities that range from robbing sensitive information like passwords, credit card details, cookies, and session data to logging keystrokes on Windows OS. Moreover, a new analysis of the ExelaStealer...
Continue Reading
Dark Web Threat Actor Dubai BACT BAIT Aljouda Consultation and Training Cybersecurity Breach

Dark web actor targets Dubai’s BACT in a cybersecurity breach

A dark web threat actor going by the username “Ynnian” has recently declared a cyber threat against BAIT Aljouda Consultation and Training (BACT), a leading trademark agent and business setup consultant based in Dubai, UAE. BACT is renowned for its extensive business networks spanning the Gulf Cooperation Council (GCC) and Europe, specialising in assisting investors...
Continue Reading
Bjorka Threat Group Hacktivist Indonesia Indonesians Passport Data Leak Dark Web

Bjorka group sells millions of Indo passports on the dark web

The Bjorka group sells the information of about 35 million Indonesian passport holders on the dark web for $10,000. The group is notorious for criticising the Indonesian government and publishing damaging information about the country’s political figures on social media platforms. An Indonesian security researcher revealed on one social media platform that a hacker had...
Continue Reading
STYX Dark Web Marketplace Fraud Services Cybercrime Fraud Prevention Cyber Threat

The new STYX dark web market offers extensive fraud services

Since its initial emergence on January 19, the new dark web marketplace, STYX, has been thriving in trading illegal products and services for cyberattacks. Some services this underground marketplace offer are identity theft, DDoS, stolen credentials and databases, malware, bypassing 2FA, cash-out services, and identity lookup. The market also has several Telegram channels for directing...
Continue Reading

Recover compromised and leaked data in real time from the dark web

Whitepaper Recover compromised and leaked data in real time from the dark web This whitepaper details the shift of cybercrime towards the deep and dark web, providing threat actors with a distinct advantage of anonymity and an unfettered platform to openly trade, exchange, and scheme. Request a copy of this Whitepaper First Name* Last Name*...
Continue Reading

Identification and recovery of compromised data on the Dark Web

Case Study Identification and recovery of compromised data on the Dark Web This case study details the identification and recovery of compromised data within the dark web landscape. Request a copy of this Case Study First Name* Last Name* Business Email* Company Name* Subject* Δ Client Support Global security operation centre incident and technical support...
Continue Reading

Dark Web Monitoring

Dark Web Monitoring Dark Threats The polity and character of cybercrime has shifted to the obvious location of the deep and dark web. The dark web affords criminal networks a distinct advantage of an anonymity and an unfettered platform to openly trade, exchange, and scheme. The architecture of the dark web means that traditional monitoring...
Continue Reading

Recover compromised and leaked data in real time from the dark web

Whitepaper Recover compromised and leaked data in real time from the dark web This whitepaper details the occurrence of data loss or data leakage from a broad range of events, such as unintentional data disclosure by corporations or third parties, or from threat actors compromising banking-related data via fraud attacks, ATM skimming, hacked third parties,...
Continue Reading
1 2 3 72