Deep Web

Germany police shut down Hydra Market dark web marketplace

Germany's Federal Criminal Police Office shut down Hydra Market, the Russian-language darknet marketplace specialized in drug dealing. Germany's Federal Criminal…

3 years ago

DeepDotWeb admin sentenced to 97 months in prison for money laundering scheme

The administrator of the DeepDotWeb (DDW) has received a sentence of 97 months in prison for money laundering. Tal Prihar…

4 years ago

Dark web marketplace ToRReZ shuts down on their own’s decision

The operators of the ToRReZ dark web marketplace have shut down their operation claiming it is the result of their…

4 years ago

Cybercrime underground flooded with offers for initial access to shipping and logistics orgs

Experts warn of the availability in the cybercrime underground of offers for initial access to networks of players in global…

4 years ago

Dark HunTOR: Police arrested 150 people in dark web drug bust

Dark HunTOR: Police corps across the world have arrested 150 individuals suspected of buying or selling illicit goods on the…

4 years ago

Dark web marketplace White House announces end to its operations

The dark web marketplace White House Market shuts down its operation, last week its operators announced that they were retiring.…

4 years ago

3.8 billion Clubhouse and Facebook user records allegedly scraped and merged, put for sale online

A user on a popular hacker forum is selling a database that purportedly contains 3.8 billion Clubhouse and Facebook user…

4 years ago

Revil ransomware operators are targeting new victims

Recently we observed that part of the REvil ransomware infrastructure was up and running again, now we can confirm that…

4 years ago

Personal information of 7 million Israelis available for sale

A threat actor that goes online with the moniker 'Sangkancil' claims to have stolen the personal information of 7 million…

4 years ago

Groove gang leaks list of 500k credentials of compromised Fortinet appliances

Groove gang leaked online Fortinet credentials that could be used to breach networks of organizations using the compromised devices. The financially…

4 years ago

This website uses cookies.