Searchlight Cyber
@SLCyberSec
Followers
783
Following
227
Media
517
Statuses
1K
Searchlight Cyber creates products to enhance investigations, protect businesses, and combat cybercrime. Request a trial at https://t.co/zDISBtLIcU
Joined May 2020
Introducing our new eBook: "ASM in the Age of CTEM". Follow this link to download your free copy now: https://t.co/FXIpoaqbBn
3
0
3
Searchlight Cyber has acquired Intangic, a pioneer in cyber risk management. Please read the full press release: https://t.co/i5BRIeXmbQ
#Cybersecurity #RiskManagement #Acquisition #CybersecurityNews
0
0
0
On 22 October 2025, we discovered a new data exfiltration and extortion group named Genesis. It's unclear whether the group leverages ransomware against their victims or just steals data and attempts to extort them. Genesis stated that they do not work with affiliate programs.
0
0
0
"By the end of this webinar, my attack surface could be vastly different." Join Timothy H., VP of Customer Success at Searchlight Cyber, as he talks about best practice advice from his time working with some of the largest companies in the world. https://t.co/B4depfW5Zj
0
0
0
Late last month, @SLCyberSec Security Researchers Adam Kues (@hashkitten) and Dylan Pindur presented on Finding Critical Vulnerabilities in Adobe Experience Manager at @BSidesCBR. Today, we’re releasing our research post and presentation slides: https://t.co/phzQWUJgCP.
slcyber.io
Adobe Experience Manager is one of the most popular CMSes around. Given its widespread use throughout the enterprise, you likely interact with AEM-based sites almost every day. From a security...
3
50
197
Our Security Research team presented on “Finding Critical Vulnerabilities in Adobe Experience Manager” at @BSidesCBR late last month. We’ve published our research detailing the internals of AEM and how we discovered seven CVEs ranging in criticality: https://t.co/mXsFs2qPi1.
slcyber.io
Adobe Experience Manager is one of the most popular CMSes around. Given its widespread use throughout the enterprise, you likely interact with AEM-based sites almost every day. From a security...
0
0
1
On 9 October 2025, Searchlight Cyber analysts discovered a new data exfiltration and extortion group named Brotherhood. It was unclear whether the group leverages ransomware against their victims or just steals data and attempts to extort them. #Ransomware
0
0
0
What does the ransomware landscape look like in 2026 and beyond? Luke Donovan, Head of Threat Intelligence at Searchlight Cyber delves into the potential ways ransomware groups may operate moving forward. #Ransomware #DarkWeb #ThreatIntelligence
0
0
0
In the latest episode of The Dark Dive podcast, Searchlight's Head of Threat Intelligence Luke Donovan joins to give an update on the #ransomware landscape, following our most recent #ransomwarereport: https://t.co/rHOfBpJcT0
0
0
2
📣 Calling all MSSPs...want a free pass for ChannelCon? Register and claim your free pass using the code: EMEA25Searchlight. Register now at: https://t.co/6giI2gTSfa
#ChannelConEMEA
0
1
2
Our ransomware in H1 report has landed. New groups, more victims, and rising threats. Download “An Escalation in Attacks” now to see the most active groups, their methods, and what organizations should expect next. https://t.co/0QS0rpoTjS
#ransomwaregroup #ransomware
0
0
1
“This is a report that, if created manually, would have taken a solid two days of work, maybe a week in between other tasks, and [the AI Research Assistant] did that in less than a minute.” - Security Analyst Learn more about Searchlight AI at https://t.co/EV5J6pu15C
0
0
1
On 17 September 2025, Searchlight Cyber analysts discovered the victim shaming blog operated by the BlackShrantac ransomware group. The group appears to employ double extortion tactics and threatens to share sample data via their victim shaming blog.
0
0
1
On 16 September 2025, Searchlight analysts discovered the victim shaming blog operated by the Coinbase Cartel. The group threatens to share sample data via their victim shaming blog . They stated they don't use ransomware to encrypt systems and solely rely on data exfiltration.
0
0
1
On 10 September 2025, Searchlight Cyber analysts discovered the victim shaming blog operated by the ‘The Gentlemen’ ransomware group. The group appears to employ double extortion tactics and threatens to share sample data via their victim shaming blog.
0
0
0
Piecing together scattered intelligence from dark web forums, markets, and ransomware posts can take hours - even days. That’s why we built the 𝐀𝐈 𝐑𝐞𝐬𝐞𝐚𝐫𝐜𝐡 𝐀𝐬𝐬𝐢𝐬𝐭𝐚𝐧𝐭. Discover how our AI accelerates cybersecurity investigations. https://t.co/rGXxKPw2VQ
1
0
1
On September 3, 2025, Searchlight Cyber analysts discovered a victim shaming blog operated by the LunaLock ransomware group. The group appears to employ double extortion tactics and threatens to share sample data via their victim shaming blog.
0
0
1
Earlier this year, our Security Research team discovered a high-risk secondary context path traversal issue in Omnissa Workspace One UEM (CVE-2025-25231). We also developed a chain to RCE on instances in the wild. You can read our detailed research here:
slcyber.io
Secondary Context Path Traversal vulnerability in Omnissa Workspace One UEM (CVE-2025-25231) that leads to pre-auth API access as a super admin.
0
1
4
On August 31, 2025, Searchlight Cyber analysts discovered the victim shaming blog operated by the Desolator RaaS affiliate program. A post made by a BreachForums cybercrime forum member on July 6, 2025, revealed that the group is actively recruiting new affiliates.
0
0
1
In this week's Beacon Spotlight learn more about Warlock ransomware group targeting Orange and Colt: https://t.co/EHtNQxuSn1
#cybersecuritynewsletter
0
0
1
On August 26, 2025, Searchlight Cyber analysts discovered a new data exfiltration and extortion group named Cephalus. It was unclear whether the group leverages ransomware against their victims or just steals data and attempts to extort them.
0
0
2