• Learn
      Dark Web monitoring

      Gain Comprehensive Visibility Into Your Organization's Exposure On The Dark Web.

      Breaches monitoring

      Stay Ahead Of The Curve With Our Continuous Monitoring Service For Latest Breach Services.

      Community
      Attack surface mapping

      Our Attack Surface Mapping Service Offers A Full Overview Of Your Exposed Assets.

      Supply Chain Monitoring

      Extend Your Risk Protection By Getting Immediate Insights Regarding Your Vendors' Breached Assets.

      Resources
      Brand Protection

      Protect Your Customers From Phishing And Your brand from impersonation using our Brand protection services.

      What's new
      Dark Web monitoring

      Gain Comprehensive Visibility Into Your Organization's Exposure On The Dark Web.

      Dark Web monitoring

      Gain Comprehensive Visibility Into Your Organization's Exposure On The Dark Web.

      Get Free Exposure Report

      Unlock Valuable Insights Instantly: Receive an Immediate…

      Security poster
  • Use Cases
    • Learn
      MSPs Partnership

      Discover New Avenues for Growth and Fortify Your SecurityOfferings through the Dexpose Partnership Program:Expanding Horizons and Enhancing Security Together.

      Community
      Offensive Security

      Fortify network security with our concise cybersecurityuse cases and threat insights.

      Resources
      Data partnership (API)

      Unlock the power of dark web intelligence with DeXpose's Data API integration, provide your cybersecurity product's clients with seamless access to real-time insights for enhanced cybersecurity.

      Got a Special Request?

      Unlock Valuable Insights Instantly: Receive an Immediate…

    • Free Tools
      Free Darkweb Report

      Unlock Valuable Insights Instantly: Receive an Immediate Comprehensive Exposure Report For Your Organization, Covering Dark Web Markets, Malware Logs, and Public Breaches, at No Cost.

      Email Data Breach Scan

      Check if your email has been mentioned in data breaches and analyze your organization's exposure in darkweb sources.

      Oracle Breach Check

      Search your company to see if it was mentioned in the alleged Oracle Cloud breach.

      Get Free Exposure Report

      Unlock Valuable Insights Instantly: Receive an Immediate…

    • Resources
      Intel feeds

      Stay current with real-time threat intelligence, ransomware attacks, and the latest breach reporting.

      Blog

      Explore the latest cybersecurity updates, expert insights, and industry news. Stay informed on threats, trends, and solutions.

      Knowledge Hub

      Access guides, resources, and expert materials on cybersecurity and dark web intelligence. Empower your team with actionable knowledge.

      Got a Special Request?

      Unlock Valuable Insights Instantly: Receive an Immediate…

    • Learn
      Dark Web monitoring

      Gain Comprehensive Visibility Into Your Organization's Exposure On The Dark Web.

      Breaches monitoring

      Stay Ahead Of The Curve With Our Continuous Monitoring Service For Latest Breach Services.

      Community
      Attack surface mapping

      Our Attack Surface Mapping Service Offers A Full Overview Of Your Exposed Assets.

      Supply Chain Monitoring

      Extend Your Risk Protection By Getting Immediate Insights Regarding Your Vendors' Breached Assets.

      Resources
      Brand Protection

      Protect Your Customers From Phishing And Your brand from impersonation using our Brand protection services.

      What's new
      Dark Web monitoring

      Gain Comprehensive Visibility Into Your Organization's Exposure On The Dark Web.

      Dark Web monitoring

      Gain Comprehensive Visibility Into Your Organization's Exposure On The Dark Web.

      Get Free Exposure Report

      Unlock Valuable Insights Instantly: Receive an Immediate…

      Security poster
  • Use Cases
    • Learn
      MSPs Partnership

      Discover New Avenues for Growth and Fortify Your SecurityOfferings through the Dexpose Partnership Program:Expanding Horizons and Enhancing Security Together.

      Community
      Offensive Security

      Fortify network security with our concise cybersecurityuse cases and threat insights.

      Resources
      Data partnership (API)

      Unlock the power of dark web intelligence with DeXpose's Data API integration, provide your cybersecurity product's clients with seamless access to real-time insights for enhanced cybersecurity.

      Got a Special Request?

      Unlock Valuable Insights Instantly: Receive an Immediate…

    • Free Tools
      Free Darkweb Report

      Unlock Valuable Insights Instantly: Receive an Immediate Comprehensive Exposure Report For Your Organization, Covering Dark Web Markets, Malware Logs, and Public Breaches, at No Cost.

      Email Data Breach Scan

      Check if your email has been mentioned in data breaches and analyze your organization's exposure in darkweb sources.

      Oracle Breach Check

      Search your company to see if it was mentioned in the alleged Oracle Cloud breach.

      Get Free Exposure Report

      Unlock Valuable Insights Instantly: Receive an Immediate…

    • Resources
      Intel feeds

      Stay current with real-time threat intelligence, ransomware attacks, and the latest breach reporting.

      Blog

      Explore the latest cybersecurity updates, expert insights, and industry news. Stay informed on threats, trends, and solutions.

      Knowledge Hub

      Access guides, resources, and expert materials on cybersecurity and dark web intelligence. Empower your team with actionable knowledge.

      Got a Special Request?

      Unlock Valuable Insights Instantly: Receive an Immediate…

Threat Actor Profile: Mustang Panda

Chinese cyberespionage group Mustang Panda diagram.

Mustang Panda is a highly persistent and adaptive Chinese state-linked cyber espionage group operational since at least 2012. Known by multiple aliases—including Red Delta, TA416, and Stately Taurus—this threat actor has consistently targeted entities of strategic relevance to the People’s Republic of China (PRC), using a sophisticated blend of spear-phishing, custom malware, and stealthy command-and-control […]

AnyDesk Clone Malware Drops Phemedrone Stealer Loader

On June 16, 2025, a suspicious domain impersonating AnyDesk — anydeske[.]icu — was reported on Twitter. The site served what appeared to be a legitimate remote access tool but actually delivered a malicious .NET loader. Further investigation revealed that the loader employed AES decryption, anti-analysis junk code, and evasion techniques to ultimately deliver Phemedrone Stealer. Attack Chain Overview […]

Uncovering Kimsuky APT Infrastructure | Threat Report

Summary Recently identified previously undetected Kimsuky (also known as Black Banshee) infrastructure through advanced pivoting techniques. Using HTTP header analysis, SSL Cert and JARM fingerprinting. We uncovered several IPs and domains, many of them were not flagged by VirusTotal at the time of discovery. Who is APT43 Kimsuky / Black Banshee? Kimsuky, also known as […]

Smishing Triad Impersonates Egypt Post in Phishing Scam

A recently observed phishing campaign impersonating Egypt Post (البريد المصري) has been attributed to the Smishing Triad, a well-documented cybercriminal group for their phishing (smishing) campaigns across multiple countries. The campaign impersonates Egypt Post, aiming to steal credentials and financial information through fraudulent SMS messages and phishing websites. Overview of the Campaign In early May 2025, multiple phishing SMS […]

FleshStealer Malware Report – Multivector Data Theft

Introduction FleshStealer is a sophisticated, modular, and obfuscated .NET-based information-stealing malware designed for comprehensive data exfiltration from Windows systems. Its architecture is built for scale and stealth, utilizing multithreading to simultaneously run multiple data harvesting routines with minimal system disruption. The malware targets a wide range of applications and services, including browsers, messaging apps, email […]

SalatStealer Malware Analysis and Data Theft Techniques

Introduction Salat Stealer is a stealthy malware developed in the Go programming language, designed to infiltrate systems and extract sensitive data. Once it infects a device, it gathers extensive system information, such as hard drive details, screen resolution, running processes, and active windows. One of its most alarming features is its ability to live-stream the […]

PureLogs malware analysis with data theft techniques

Introduction PureLogs is an advanced information stealer designed to extract credentials, session tokens, and system details while employing strong anti-analysis techniques. It encrypts stolen data using AES-256 before sending it to a remote Command & Control (C2) server.   Capabilities and Functionality PureLogger is an advanced information stealer designed to exfiltrate a wide range of […]

Undetected .NET PE Injector Found on Archive Org

Introduction On February 11, 2025, Filescan.io shared a troubling discovery: a 6-month-old .NET PE injector had remained undetected on Archive.org, a platform widely used for archiving web content. The file was flagged as clean, allowing it to remain accessible for months. Capabilities This malware incorporates multiple techniques to evade detection and maintain persistence on infected systems. It employs the following capabilities: […]

How Dark web Monitoring Protects Your business

Dark web monitoring is a crucial step for businesses to safeguard their sensitive data. This process involves scanning the dark web for compromised information, such as stolen credentials and proprietary data. Data breaches can have severe consequences, including reputational damage, financial losses, and operational disruptions. When employees reuse passwords across different platforms, it increases the […]

Email Breach Scan: How to Protect Your Personal Information

Email breaches pose significant risks to personal security when unauthorized users access email accounts or sensitive data. Often, leaked credentials can end up being sold on the dark web, leading to consequences like identity theft and financial loss. Public database breaches are common as hackers exploit vulnerabilities in organizations’ software systems. To protect your data, […]

In-Depth Technical Analysis of Lumma Stealer

Introduction Lumma is a sophisticated information stealer, written in C/C++, that has been active in the wild since at least August 15, 2022. The first publicly identified sample appeared on Malware Bazaar on December 20, 2022. By late 2022, the threat actor “Shamel,” operating under the alias “Lumma,” began promoting the malware on Russian-speaking cybercrime […]

Egyptian Organizations Darkweb Exposure Report

Are you wondering what kind of information about the Egyptian organizations the Darkweb has? As we all remember, the last few years were bad for many organizations regarding hacking and cyber threats. Digital shadows team published research indicating that there is ~24 Billion credentials pair available already on darkweb. These credentials sources vary from public database breaches […]