Deciphering Black Basta’s Infrastructure from the Chat Leak

Deciphering Black Basta’s Infrastructure from the Chat Leak

| | Blog, Dark Web Insider
By Oleg Lypko, with Estelle Ruellan and Tammy Harper (Flare Research) This article has originally appeared on Cybercrime Diaries On February 20, 2025, the cybersecurity community received an unexpected stroke of luck as internal strife seemingly spread within the infamous Black Basta ransomware group. On that day, an unknown individual ... Read More
The Underground’s Favorite Messenger: Telegram’s Reign Continues

The Underground’s Favorite Messenger: Telegram’s Reign Continues

| | Blog, Dark Web Insider
The data and visualizations presented on this webpage are based on information collected from January 2024 to January 2025. These graphs are static and do not reflect real-time updates or recent developments. Any trends, insights, or conclusions should be interpreted with this timeframe in mind. Executive Summary:  Telegram remains the ... Read More
MOVEit Repackaged and Recycled

MOVEit Repackaged and Recycled

| | Blog, Dark Web Insider
The largest repackage and re-post of an old leak In November 2024, a hacker known as “Nam3L3ss” allegedly released previously undisclosed data from the MOVEit breach in May 2023. This leak consisted of millions of records, including sensitive employee and big brand corporate information, significantly escalating the breach’s impact. Digging ... Read More
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "The Typology of Illicit Telegram Channels." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

The Typology of Illicit Telegram Channels

Cybercriminals seem to always be looking for new and innovative ways to commit their crimes more efficiently. In the past, the dark web and parts of the deep web were some of the most common places where you can find cybercriminals committing their schemes. However, many criminals have moved over ... Read More
Light background with a graphic on the right side with three threat actors (one is rolling a large coin, the other is breaking into a computer, and another is interacting with login credentials. There is a dark yellow oval in the top left with the white text "Blog: and blue text below "The Cybercrime Assembly LIne."

The Cybercrime Assembly Line

| | Blog
Back in 2018, the Center for Strategic and International Studies came to the conclusion that cybercrime cost the world an approximate $600 billion annually, nearly 1% of global GDP. The cyber threat landscape has been constantly evolving, and the amount of money lost to cybercrime has only been increasing. According ... Read More
SAP Cyber Threat Intelligence report – November 2018

SAP Cyber Threat Intelligence report – November 2018

| | Blog, SAP Security Notes
The SAP threat landscape is always expanding thus putting organizations of all sizes and industries at risk of cyber attacks. The idea behind the monthly SAP Cyber Threat Intelligence report is to provide an insight into the latest security vulnerabilities and threats. Key takeaways The recent patch update consists of ... Read More
Blog – ERPScan
Analyzing Oracle Security – Oracle Critical Patch Update for October 2018

Analyzing Oracle Security – Oracle Critical Patch Update for October 2018

Today Oracle has released its quarterly patch update for October 2018. It fixes 301 vulnerabilities. The main highlights are as follows: Oracle closed 1119 issues in 2018 in total that is the same as in 2017. CPU for October 2018 contains 162 vulnerabilities in business-critical applications. The most vulnerable application ... Read More
Blog – ERPScan
SAP Cyber Threat Intelligence report – October 2018

SAP Cyber Threat Intelligence report – October 2018

The SAP threat landscape is always expanding thus putting organizations of all sizes and industries at risk of cyber attacks. The idea behind the monthly SAP Cyber Threat Intelligence report is to provide an insight into the latest security vulnerabilities and threats. Key takeaways Today SAP has released its monthly ... Read More
Blog – ERPScan
SAP Cyber Threat Intelligence report – September 2018

SAP Cyber Threat Intelligence report – September 2018

| | Blog, SAP Security Notes
The SAP threat landscape is always expanding thus putting organizations of all sizes and industries at risk of cyber attacks. The idea behind the monthly SAP Cyber Threat Intelligence report is to provide an insight into the latest security vulnerabilities and threats. Key takeaways The recent patch update consists of ... Read More
Blog – ERPScan
Analyzing Oracle Security – Oracle Critical Patch Update for July 2018

Analyzing Oracle Security – Oracle Critical Patch Update for July 2018

| | Blog, Oracle CPU
Today Oracle has released its quarterly patch update for July 2018. It fixes a record number of 334 vulnerabilities. The main highlights are as follows: The average number of security issues released every quarter keeps growing this year. CPU for July contains 203 vulnerabilities in business-critical applications. It’s 61% of ... Read More
Blog – ERPScan
Loading...