Deep Web

Hackers flooded the Babuk ransomware gang’s forum with gay porn images

The Babuk ransomware operators seem to have suffered a ransomware attack, threat actors flooded their forum gay orgy porn images.…

4 years ago

TicketClub Italy Database Offered in Dark Web

A database belonging to TicketClub Italy, a company providing coupons platform for offline purchases, is available for sale on darkweb…

4 years ago

XLoader, a $49 spyware that could target both Windows and macOS devices

Check Point Research (CPR) experts have spotted a cheap malware, dubbed XLoader variant, which was upgraded to target both Windows and…

4 years ago

Threat actor claims to have stolen 1 TB of data belonging to Saudi Aramco

A hacker claims to have stolen 1 TB of sensitive data from the Saudi Arabian petroleum and natural gas giant,…

4 years ago

Threat actors scrape 600 million LinkedIn profiles and are selling the data online – again

Researchers from Cyber News Team have spotted threat actors offering for sale 600 million LinkedIn profiles scraped from the platform,…

4 years ago

Tor Browser 10.5 is out, it includes a new anti-censorship feature

The Tor Project has released Tor Browser 10.5 which enhances an anti-censorship feature and warns of V2 onion URL deprecation.…

4 years ago

New LinkedIn breach exposes data of 700 Million users

A new massive LinkedIn breach made the headlines, the leak reportedly exposes the data of 700M users, more than 92%…

4 years ago

Marketo Marketplace – Cybercriminals are targeting major law firms

Cybercriminals published for sale in Dark Web 58GB of data stolen from Hollingsworth LLP. One of the emerging underground marketplaces…

4 years ago

Tor Browser 10.0.18 fixes a bug that allows to track users by fingerprinting installed apps

The Tor Project released Tor Browser 10.0.18 that addresses a flaw that allows sites to track users by fingerprinting the…

4 years ago

Wear your MASQ! New Device Fingerprint Spoofing Tool Available in Dark Web

The MASQ tool could be used by attackers to emulate device fingerprints thus allowing them to bypass fraud protection controls The…

4 years ago

This website uses cookies.