Advertisement · 728 × 90

Posts by fastfire

Post image

📢 New #Insomnia ransomware gang.
☢️ Active since October 2025, 17 victims published on their data leak site.
👉🏼 Onion link and TOX ID already available on #deepdarkCTI github.com/fastfire/dee...

2 months ago 0 1 0 0
Post image

📌 How is the ransomware gang landscape evolving after the #RAMP forum seizure?
🔴 Another well-known forum seems to be becoming a point of reference in this field.
👉🏼 We discuss it in the article you can read at this link www.neteye-blog.com/2026/02/from...

2 months ago 1 2 0 0
Post image

With 2025 now behind us, we can make some observations regarding the landscape of double-extortion #ransomware #attacks.
❓ Which ransomware gangs were the most active?
❓ Which sectors and countries were most affected?

👉🏻 Read the full article here www.neteye-blog.com/2026/01/rans...

3 months ago 1 1 0 0
Post image

📢 Recap of what happened in #deepdarkCTI in 2025:

✅ 586 commits
✅ 35 contributors
✅ 6,400 stars on GitHub
✅ 8 articles on www.deepdarkcti.com
✅ 129 active users within the Telegram channel
✅ a total of 2,465 sources

🙏 Many thanks to the #deepdarkCTI community!

3 months ago 3 0 0 0
Post image

A new interview is available on the #deepdarkCTI project blog. This time, the interview concerns the #Benzona ransomware gang.
👉 You can read the full interview here deepdarkcti.com/interview-8-...

3 months ago 0 0 0 0

@ichinin.bsky.social I don't think you read the article carefully; perhaps you just looked at the image. The indicators provided are always contextualized within an analysis ticket. So, yes, it's intelligence.

5 months ago 0 0 1 0
Post image

🔴The problem of properly integrating #Threat #Intelligence into #Security #Operations processes is a recurring one.
📌 I wrote an article in which I described the integration process we have implemented.
👉🏻 Read the article here www.neteye-blog.com/2025/11/embe...

5 months ago 0 0 1 0
Advertisement
Post image

#Ransomware 📣 NEW FEATURE
La nuova sezione RF Domain Monitor permette il monitoraggio costante dei domini sotto controllo #Ransomfeed e di deepdarkCTI project (@fastfire.bsky.social), alla ricerca di variazioni DNS e law enforcement.
1/2

5 months ago 2 1 1 0
Post image

📢 We interviewed Gabi, a member of the #Cyber ​​#Toufan group. This group, active since October 2024, has carried out several attacks against #Israeli targets.
The full interview is available at the link deepdarkcti.com/interview-7-...

7 months ago 1 0 0 0
Post image

📢 At deepdarkcti.com/details-of-t..., you can find a detailed timeline of the main events related to the alleged seizure of the #XSS forum.
⏰ The timeline is constantly updated, taking into account relevant events that are also occurring in recent days.
#deepdarkCTI

8 months ago 1 0 0 0
Post image

📢 A new interview is available on the #deepdarkCTI website. This time, community member #Erez interviewed the founder of the #Devman ransomware gang.
👉🏻 You can read the full interview at this link deepdarkcti.com/interview-6-...

9 months ago 1 0 0 0
Preview
GitHub - fastfire/IsraelIranConflict: List of groups that are carrying out cyber actions in the conflict between Israel and Iran. List of groups that are carrying out cyber actions in the conflict between Israel and Iran. - fastfire/IsraelIranConflict

If you want to contribute, I created this project where I'm cataloging the Telegram channels of the various groups related to the Israel-Iran conflict, shared by @cyberknow.bsky.social github.com/fastfire/Isr...

10 months ago 1 0 0 0
Loading...

📢 New Critical Vulnerabilities Disclosed for Citrix Netscaler support.citrix.com/support-home...

10 months ago 1 0 0 0
Post image

We interviewed #Se7en, the founder of #Exodus #Market, a platform for selling #infostealers #logs.
Read the full interview here deepdarkcti.com/interview-5-...

10 months ago 0 1 0 0
Post image

New ransomware gang #RunSomeWares DLS. 4 victims claimed. Already indexed on #deepdarkCTI

1 year ago 3 0 0 0
Post image

New ransomware gang #Anubis DLS. Already indexed on #deepdarkCTI

1 year ago 0 0 0 0
Advertisement
Post image

⚔️ New data leak site: #Kraken ransomware gang. The gang seems to be simply a rebrand of #HelloKitty, as of the 5 victim organizations already declared, 2 (Cisco and CDProject) had already been previously declared.
🎯 The DLS link has already been added to #deepdarkCTI (github.com/fastfire/dee...).

1 year ago 3 0 0 0
Post image

Some updates regarding the #Gravy #Analytics data breach. I analyzed part of the data shared by TA #nightly on #XSS forum. Some of the numbers involved:
13473 applications
396115 ip
3317 organizations
43586 locations
11 countries
330543 partners email accounts

1 year ago 1 0 0 0
Post image

Happy Holidays to the amazing #deepdarkCTI community! Our project has reached 4600 stars this year, since the beginning of the project we have had 93 contributors, in the private Telegram channel there are about 100 users, we have counted over 1900 sources! Thank you all so much!

1 year ago 2 0 1 0
Preview
GitHub - fastfire/deepdarkCTI: Collection of Cyber Threat Intelligence sources from the deep and dark web Collection of Cyber Threat Intelligence sources from the deep and dark web - fastfire/deepdarkCTI

If you don't already... consider following and supporting #deepdarkCTI github.com/fastfire/dee...

1 year ago 12 3 0 0
Post image

When you work together with friends, everything is easier! #CyberSec #ThreatIntelligence

1 year ago 1 0 0 0

Great list @oxley.io! If you would consider adding my account... thanks!

1 year ago 0 0 0 0