The Dark Web Monitoring platform for business and enterprise. Managed Threat Intelligence services to detect darkweb & OSINT data-breach and theft.
#NAFO
Intel
Thanks to you all who joined us live for our CAPTCHA cracking webinar. We were really taken back by the amount of registrations and ammount of you who watched us live. Our Article on Advanced cracking techniques is now live!
🚨BREAKING NEWS🚨 A hacking group has alleged they have leaked every single person's bank card PIN number. This could be the single most important hack of the card payment system in history! A file containing all PINs in the world was found on derp web. Redacted proof shown.
A user on
#BreachForums
has shared the Leak of a Russian Dark Web Market Solaris, that was allegedly dumped by a Security Company (Hold Security). The leak contains source code and databases.
For a limited time only our Ultimate Divinity Plan customers benefit from every single packet being blessed by the pope for added protection from malware and negative sprits. This service also extents to Email Blessing(tm) for unparalleled protection against phishing.
We believe we have uncovered a new Ransomware Group operating on the Dark Web, only going by the name "Caprisun Gang" not a lot is know right now but this could be a new refreshing turn for cyber crime.
ALPHV takes back their seized onion domain - probably still have their private keys and claps back at the FBI. Today has been an interesting day in the Ransomware drama. But all this back and forth isn't really helping victims.
Hello, We've just completed a link* report of about 1.9Million BTC addresses, spanning our entire collection. If you think this report would be useful to you we are happy to share, dm or comment. It is 1GB Uncompressed, 23MB Compressed. *link report represents a list of known btc…
🔥Follow months of work and lots of customer feedback we've launched our new UI today. This milestone is the start of significant development trajectory for 2023. Thanks to all who contributed 🙏
Full complete list of verified telegram channels, over 1,600 identified from our information collection feeds. If you have found these useful and want to see this distributed on a regular basis (possibly a free API) please leave a comment and let us know.
The very likely source of these credentials are end customer compromise via stealer malware rather than the Anydesk breach. This has been partially confirmed by matching some of the exposed client emails to exact stealer log entries we've been able to obtain.
AnyDesk stating that no passwords etc. of customers are stored on their end that could be exploited to hijack sessions and connect to endpoints.
Also AnyDesk:
Leaked customer data with passwords that allows access to sessions
@etguenni
now you know
BREAKING: The New York State Legislature was hit by a ransomware attack on the systems it uses to draft legislation. This comes at the worst time because they were in the process of drafting the budget legislation they are trying to to pass by the close of business Friday. They…
Any Ukraine government agencies who require real time digital risk monitoring please sign up for a free account and you will be upgrading to our Enterprise plan for free. We have already upgraded our existing customers 🇺🇦