Dexpose Blog

Researches, News, and more
Subscribe for regular updates, research, and actionable insights.

Top Articles

Introduction Salat Stealer is a stealthy malware developed in the Go programming language, designed to infiltrate systems and extract sensitive data. Once it infects a device, it gathers extensive system information, such as hard drive

Introduction PureLogs is an advanced information stealer designed to extract credentials, session tokens, and system details while employing strong anti-analysis techniques. It encrypts stolen data using AES-256 before sending it to a remote Command &

Dark web monitoring is vital for businesses to protect sensitive data, detect breaches early, and respond swiftly to mitigate risks.

Email breaches pose significant risks to personal security when unauthorized users access email accounts or sensitive data. Often, leaked credentials can end up being sold on the dark web, leading to consequences like identity theft

Introduction On February 11, 2025, Filescan.io shared a troubling discovery: a 6-month-old .NET PE injector had remained undetected on Archive.org, a platform widely used for archiving web content. The file was flagged as clean, allowing

Lumma Stealer is a stealthy, advanced info-stealing malware. Explore its online presence, pricing, infrastructure, and attack methods in our in-depth analysis, designed to help security professionals understand and counter this cyber threat.
Are you wondering what kind of information about the Egyptian organizations the Darkweb has? As we all remember, the last few years were bad for many organizations regarding hacking and cyber threats.

Get Your Free Report