Check out Threat Flow, the Security Industry’s First Transparent Generative AI Application

Threat Spotlight: Data Extortion Ransomware: Key Trends in 2023

data extortion ransomware key trends in 2023

Ransomware Trends Overview As ransomware’s fundamental nature shifts from encryption to data exfiltration, organizations’ data backup and recovery practices no longer protect them from attacks. Over the course of the past few years, the cybercriminal landscape changed too. More and more criminal ransomware organizations are adopting “as-a-Service” business models on the dark web which open the […]

Threat Spotlight: Initial Access Brokers on Russian Hacking Forums

A navy background with the white text in all caps "Initial Access Brokers on Russian Hacking Forums."

Russian Hacking Forum Trends Initial access brokers (IAB) are sophisticated, focused, and specialized threat actors that focus on finding and gaining access to corporate environments. Once they compromise these environments, they auction off or sell the access on dark web forums.  To date in 2023, more than 100 companies across 18 industries had access to […]

Threat Spotlight: The Dark Web and AI

A navy background with the white text in all caps "The Dark Web and AI."

Executive Overview More than 200,000 credentials to AI language models are currently being sold on the dark web as part of stealer logs, files containing thousands of credentials derived from infostealer malware. This certainly raises the risk that employees will leak sensitive data into models, and then lose the credentials. However, we see even more […]

Threat Spotlight: Stealer Logs & Corporate Access

A navy background with the white text in all caps "Stealer Logs & Corporate Access."

Executive Overview Over the last three years, infostealer malware variants have become a “popular trend” in the cybercriminal Malware-as-a-Service (MaaS) ecosystem. Doing precisely as their category implies, these malware variants steal information from users’ devices. After infecting the device, the malware employs various techniques to remain undetected while sending data to the malicious actors’ command […]

Telegram Hacking Channels: An Emerging Risk

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Telegram Hacking Channels: An Emerging Risk." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Telegram, a popular encrypted messaging app known for its commitment to privacy and security, has ironically become a hub for cybercriminal activities. The platform is increasingly hosting channels that facilitate hacking, distribute stolen data, and provide a marketplace for cybercrime tools and services.  Telegram complements the dark web as an alternate place to gather if […]

Exploit Forum, Initial Access Brokers, and Cybercrime on the Dark Web

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Exploit Forum, Initial Access Brokers, and Cybercrime on the Dark Web." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

The notorious Exploit.in dark web forum is a hotspot for cybercriminals and hosts an auction system. On this forum, malicious actors can share various hacking techniques, malware samples, and proof of concept for exploits.  Some threat actors on Exploit are initial access brokers (IAB), who sell information about accessing organizations’ environments such as with administrative […]

Babuk Ransomware Group: What You Need to Know

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Babuk Ransomware Group: What You Need to Know." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

The Babuk ransomware group emerged into the world of illicit activities relatively recently in 2021. Since then, they have conducted a series of high-profile ransomware attacks across various industries. The group targeted organizations across a wide range of sectors, including healthcare, logistics, and professional services, leaving a trail of encrypted files and ransom demands in […]

Grief Ransomware Group: What You Need to Know

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Grief Ransomware Group: What You Need to Know." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Among the multitude of threat actors dominating the cybersecurity landscape, Grief ransomware group has risen to prominence. Known for their ruthless attacks and uncompromising tactics, Grief has quickly carved a niche for itself in the dark underworld of cybercrime. Understand their methods to better anticipate their moves and boost your defenses. Understanding the Grief Ransomware […]

Threat Spotlight: “Legal” Cybercrime Activities

A navy background with the white text "'Legal' Cybercrime Activities"

Executive Overview We often generalize threat actors as the “attackers” and cyber practitioners as the “defenders.” This simplification can work for many purposes, but what if we’re missing key relationships because of it? Not all activities related to cybercrime require secrecy or direct malicious intent, so cybercriminals utilize a vast network of contractors to develop […]

Top Cybercrime Forums to Monitor in 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Top Cybercrime Forums to Monitor in 2023." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

As cyber threats continue to evolve in complexity and frequency, staying informed about the latest trends and emerging threats is crucial for cybersecurity professionals. One effective way to do this is by monitoring top cybercrime forums, where threat actors often discuss new tactics, techniques, and tools.  This article will provide an overview of the most […]