Deciphering Black Basta’s Infrastructure from the Chat Leak

Deciphering Black Basta’s Infrastructure from the Chat Leak

| | Blog, Dark Web Insider
By Oleg Lypko, with Estelle Ruellan and Tammy Harper (Flare Research) This article has originally appeared on Cybercrime Diaries On February 20, 2025, the cybersecurity community received an unexpected stroke of luck ...
Leaky Weekly: PowerSchool Hack; Takedowns & Arrests & Leaks, Oh My!; and ITRC Breach Report

PowerSchool Hack; Takedowns and Arrests and Leaks, Oh My!; and ITRC Breach Report Findings 

| | Blog, Dark Web Insider
There’s been quite a few hacks, takedowns-arrests-leaks, and insights from the Identity Theft Resource Center (ITRC) 2024 Breach Report.  Dive into the most pressing recent stories on data leaks, cybercrime, and the ...
The Underground’s Favorite Messenger: Telegram’s Reign Continues

The Underground’s Favorite Messenger: Telegram’s Reign Continues

| | Blog, Dark Web Insider
The data and visualizations presented on this webpage are based on information collected from January 2024 to January 2025. These graphs are static and do not reflect real-time updates or recent developments ...
MOVEit Repackaged and Recycled

MOVEit Repackaged and Recycled

| | Blog, Dark Web Insider
The largest repackage and re-post of an old leak In November 2024, a hacker known as “Nam3L3ss” allegedly released previously undisclosed data from the MOVEit breach in May 2023. This leak consisted ...
Infostealer Malware: An Introduction

Infostealer Malware: An Introduction

| | Blog, Dark Web Insider
Infostealer malware represents one of the most underrated threats to corporate and consumer information security today. These sophisticated remote access Trojans (RATs) silently infect computers and systematically exfiltrate massive amounts of sensitive ...
Infostealer Malware: An Introduction

Infostealer Malware: An Introduction

| | Blog, Dark Web Insider, Resource Center
Infostealer malware represents one of the most underrated threats to corporate and consumer information security today. These sophisticated remote access Trojans (RATs) silently infect computers and systematically exfiltrate massive amounts of sensitive ...
Dark Web Forum Arrests, Columbus Ransomware Attack Updates, and American Background Info Data Leak

Dark Web Forum Arrests, Columbus Ransomware Attack Updates, and American Background Info Data Leak

| | Blog, Dark Web Insider
Keeping up with the world of cybercrime is important but can often feel overwhelming for security practitioners. Leaky Weekly is a podcast hosted by security researcher Nick Ascoli as he dives into ...
Cybercrime Current Events: AWS Takeover Campaign, Ransomware Attack on Columbus, and City of Columbus Sues Ransomware Researcher Whistleblower

Cybercrime Current Events: AWS Takeover Campaign, Ransomware Attack on Columbus, and City of Columbus Sues Ransomware Researcher Whistleblower

| | Blog, Dark Web Insider
There’s so much to keep up with in the world of cybercrime…especially for security practitioners. Leaky Weekly is a bi-weekly podcast hosted by security researcher Nick Ascoli as he dives into the ...
Dark blue background with the Leaky Weekly logo on the left side in a circle. To the right is a green oval with "Podcast" inside. Below it is the text in white: "Background Check Organization Breach, A Repossessed Ransomware Blog, Feuding Forums, and the Double Arrest of "J.P. Morgan"

Cybercrime Current Events: Background Check Organization Breach, a Repossessed Ransomware Blog, Feuding Forums, and Double Arrest of “J.P. Morgan”

| | Blog, Dark Web Insider
There’s so much to keep up with in the world of cybercrime…especially for security practitioners. Leaky Weekly is a bi-weekly podcast hosted by security researcher Nick Ascoli as he dives into the ...
Leaky Weekly Pilot: Stealer Logs, Hacktivists, and Unauthorized Access

Launching Leaky Weekly with Flare, Cybercrime Current Events Podcast

| | Blog, Dark Web Insider
There’s so much to keep up with in the world of cybercrime…especially for security practitioners. Leaky Weekly is a bi-weekly podcast hosted by security researcher Nick Ascoli as he dives into the ...