Threat Spotlight: Triple Extortion Ransomware

This article was updated on July 25, 2025 with updated information Ransomware has always been about extorting money from victims. But why get paid once when you could get paid three times? Not content with single extortion attacks, ransomware gangs have escalated to double and even triple extortion. With the commodification of cybercrime, adversaries have […]
Threat Spotlight: Bypassing Safeguards on Generative AI

There are two major trends coming together in the realm of cyber threats: 1) generative AI applications are redefining how we engage with each other and our environments, and 2) threat actors are abusing these same generative AI applications that are creating new positive possibilities to manipulate them for malicious purposes. (Check out our last […]
Key Dark Web Forums to Monitor

This article was updated on July 21, 2025 with updated information The dark web is often a mysterious and misunderstood corner of cyberspace. Often misrepresented as accessible from the greater public view of the internet, the dark web is actually not as readily as accessible as it may seem to be. This is because it […]
Top 4 Dark Web Marketplaces to Monitor

This article was updated on November 4, 2025 with updated information The ever-changing nature of dark web marketplaces makes it vital to stay on top of the main sites worth monitoring. High-profile markets sometimes close overnight, and new markets can surge in popularity quickly. We’ve put together the top five dark web marketplaces worth monitoring […]
The Genesis Market & Infostealer Malware Threat: What You Need to Know

One of the most challenging developments in recent years in defending against cyber attacks is the emergence of cyber crime marketplaces. Often accessible on both the dark and clear web, these marketplaces offer an outlet for threat actors to trade in stolen information, hacking tools, and even hacking services. This article focuses on the popular […]
Telegram Fraud & Cybercrime: A Rising Concern in 2023

This blog was edited on July 7, 2025, with updated information. Since its launch in 2013, Telegram has positioned itself as a privacy-first messaging app offering encrypted voice and video calls, group functionality, and powerful file-sharing capabilities. Its sleek design and emphasis on user security have attracted millions worldwide — including a growing population of […]
How the Dark Web is Embracing ChatGPT and Generative AI

ChatGPT and GPT-4 have been dazzling their users with their linguistic prowess. But, have you ever wondered if (and how) these large language models (LLMs) are also making a splash in the darker corners of the internet? It turns out that threat actors are indeed finding creative ways to exploit the technological marvels of generative […]
Threat Spotlight: Generative AI

Two converging trends are on the precipice of reshaping the cyber threat landscape dramatically. The world is in the midst of a technological revolution that looks likely to cause significant and disruptive changes to society. Generative AI applications are poised to revolutionize the way we work, learn, and interact with our environment. Unlike some previous […]
Threat Actors: The Definitive 2023 Guide to Cybercriminals

In a digital world, companies collect more data and more types of data than ever before. As people use more technology, they generate new types of sensitive data. While data protection laws and compliance frameworks often detail categories of information requiring enhanced protection, they fail to keep pace with technological advances. When people understand the […]
Threat Spotlight: Dark Web Supply Chain

Executive Overview Stealer logs are a threat for every company. Threat actors infect devices with stealer malware, exfiltrate the browser fingerprints & saved logins in the browser, and sell them on dedicated dark web marketplaces for less than $50. Breaches caused by stealer logs can cause hundreds of thousands if not millions of dollars of […]