Posts

Cyber Crime Growth

Examining the current growth of cyber crime and the potential consequences of it...

Genesis Market - The Market which sells your credential...

An Insight into the Genesis Marketplace - where your credentials are sold less t...

Clearnet Criminal Marketplaces

Criminals use marketplaces such as shoppy.gg, atshop.io, sellpass.io to sell the...

Telegram Extrap/Binning Fraud Communities

Gain an insider insight into the illegal fraud communities on Telegram. Learn ab...

Parrot CTFs Buys out Y2ksecurity

Parrot CTFs a growing cyber security education platform buys former ctf platform...

Insider: QR Clipper Replaces QR Codes for Bitcoin Tran...

Beware of QR Clipper - Insider warns of new tool used to maliciously replace QR ...

Telegram: Government Backdoor Concerns

Explore the concerns of Telegram being used as a backdoor for government agencie...

Account Cracking - Configs, Proxies and Combos

Learn about the essential tools for successful account cracking: proxies, config...

Parrot CTFs Ethical Hacking Knowledge Base

The Parrot CTFs knowledge base is a treasure trove of information for anyone int...

Bank Card Killing Telegram Channels

A deep dive into the evolution from CHKNET. Criminals release a victims bank det...

Redline VIP - Stealer Logs as a Service

Protect yourself from Redline VIP: Safeguard your information and prevent being ...

Who is Atlas - Piers Morgan's Twitter Hacker

Atlas is known in multiple forums online such as OGUsers & BreachForums for his ...

Piers Morgan Twitter Hacked - How it Happened

Piers Morgan Twitter posts racist abuse after being hacked. This article explain...

Credential Snuffing Attacks on the Rise: Hackers Using ...

Credential snuffing, also known as credential stuffing, is a growing threat to b...

Uber Social Engineering Attack: How Lapsus Used WhatsAp...

Learn about the Uber social engineering attack carried out by hacker group Lapsu...

Tips for Protecting Your Business from Phishing Attacks

Learn how to protect your business from phishing attacks with these expert tips....