Exploit Forum, Initial Access Brokers, and Cybercrime on the Dark Web

This article was updated on September 5, 2025 with updated information Pulling off sophisticated cybercrimes can be shockingly simple compared to a few years ago. With the emphasis on “logging in” rather than “hacking in,” threat actors, there’s less barriers today than before. The notorious Exploit dark web forum is a hotspot for malicious actors […]
Babuk Ransomware Group: What You Need to Know

The Babuk ransomware group emerged into the world of illicit activities relatively recently in 2021. Since then, they have conducted a series of high-profile ransomware attacks across various industries. The group targeted organizations across a wide range of sectors, including healthcare, logistics, and professional services, leaving a trail of encrypted files and ransom demands in […]
Grief Ransomware Group: What You Need to Know

Among the multitude of threat actors dominating the cybersecurity landscape, Grief ransomware group has risen to prominence. Known for their ruthless attacks and uncompromising tactics, Grief has quickly carved a niche for itself in the dark underworld of cybercrime. Understand their methods to better anticipate their moves and boost your defenses. Understanding the Grief Ransomware […]
Threat Spotlight: “Legal” Cybercrime Activities

Executive Overview We often generalize threat actors as the “attackers” and cyber practitioners as the “defenders.” This simplification can work for many purposes, but what if we’re missing key relationships because of it? Not all activities related to cybercrime require secrecy or direct malicious intent, so cybercriminals utilize a vast network of contractors to develop […]
Top Cybercrime Forums to Monitor in 2023

As cyber threats continue to evolve in complexity and frequency, staying informed about the latest trends and emerging threats is crucial for cybersecurity professionals. One effective way to do this is by monitoring top cybercrime forums, where threat actors often discuss new tactics, techniques, and tools. This article will provide an overview of the most […]
Threat Tracking: Tracking Threats Across the Dark and Clear Web

The Internet is a gold mine of threat information that can bolster your cyber defenses if you actively track this data. From news updates to forum discussions on hacker forums, and data dumps to service offerings on marketplaces, there’s a lot to find out that could otherwise slip under the radar. Tracking cyber threats across […]
Threat Spotlight: The New Dark Web?

This article was updated on August 4, 2025 with updated information Illicit Telegram channels have become a growing concern in the realm of cybercrime. Threat actors want to connect with each other in fast, reliable, and “anonymous” ways. Telegram has been their answer, and malicious actors are increasingly moving off of Tor and onto the […]
8 Common Types of Illicit Telegram Channels to Monitor

This article was updated on August 19, 2025 with updated information Cybercriminals seem to always be looking for new and innovative ways to commit their crimes more efficiently. In the past, the dark web and parts of the deep web were some of the most common places where you can find cybercriminals committing their schemes. […]
Threat Spotlight: Triple Extortion Ransomware

This article was updated on July 25, 2025 with updated information Ransomware has always been about extorting money from victims. But why get paid once when you could get paid three times? Not content with single extortion attacks, ransomware gangs have escalated to double and even triple extortion. With the commodification of cybercrime, adversaries have […]
Threat Spotlight: Bypassing Safeguards on Generative AI

There are two major trends coming together in the realm of cyber threats: 1) generative AI applications are redefining how we engage with each other and our environments, and 2) threat actors are abusing these same generative AI applications that are creating new positive possibilities to manipulate them for malicious purposes. (Check out our last […]