Author: Cyber Analyst
-

Combolist
What is a Combolist? In the digital underground, one term often sparks curiosity and fear alike: combolist. This word has become a buzz in cybersecurity circles, representing one of the most common tools hackers use to exploit user data. A combolist is a collection of stolen or leaked usernames and passwords combined in a single…
-

QNAP .NET vulnerability: Urgent 7-Step Impact Guide (2025)
QNAP .NET vulnerability is a critical security issue tied to Microsoft’s ASP.NET Core (Kestrel) that exposes Windows machines running QNAP’s NetBak PC Agent to HTTP request smuggling and potential security bypass. This urgent guide explains what the vulnerability is, how defenders can safely test and mitigate, why cyber threat intelligence (e.g., darknetsearch.com) is valuable, and…
-

Ciberseguridad en el ISE 2026: la gran oportunidad para el sector audiovisual
La ciberseguridad se ha convertido en una prioridad estratégica para todas las industrias, y el sector audiovisual no es la excepción. En el marco de ISE 2026 (Integrated Systems Europe), el evento más importante del mundo en tecnología audiovisual y de integración de sistemas, el nuevo Cybersecurity Summit busca transformar la seguridad digital en una…
-

Gmail Data Breach: Google Denies Massive Password Leak in Urgent Security Update (2025 Guide)
In late October 2025, the internet was buzzing with alarming headlines about a supposed Gmail data breach that allegedly exposed millions of users’ passwords online 😱. Reports across social media and several blogs claimed that vast troves of Gmail credentials were circulating on hacker forums and the dark web. But Google quickly moved to shut…
-

Cyber Espionage
What is a Cyber Espionage? In today’s interconnected world, cyber espionage has become one of the most sophisticated and alarming forms of digital warfare. But what is cyber espionage exactly? It refers to the act of stealing confidential or sensitive data from governments, corporations, or individuals using hacking techniques. These operations are often carried out…
-

Ciberseguridad: Uruguay y España refuerzan su cooperación internacional con un acuerdo clave
La ciberseguridad se ha convertido en una prioridad estratégica a nivel mundial 🌍. En este contexto, Uruguay y España han dado un paso decisivo al firmar un memorando de entendimiento para fortalecer la cooperación internacional en ciberseguridad, con el objetivo de compartir conocimiento, desarrollar políticas conjuntas y promover un entorno digital más seguro y resiliente.…
-

Cybersécurité au Vietnam : un enjeu national stratégique
La cybersécurité au Vietnam est aujourd’hui au cœur des priorités du gouvernement. Face à la montée des cyberattaques mondiales et à la transformation numérique du pays, les autorités vietnamiennes ont mis en place une stratégie nationale de cybersécurité ambitieuse pour protéger les citoyens, les entreprises et les infrastructures critiques. 🌐 Sous la direction du ministère…
-

KYC (Know Your Customer)
What is a KYC (Know Your Customer)? In today’s digital economy, KYC (Know Your Customer) has become a cornerstone of trust and security. But what exactly is KYC, and why is it so critical for businesses and consumers alike? Simply put, KYC is a process that helps organizations verify the identity of their clients to…
-
![APT36 Malware Campaign Revealed: Golang-Based DeskRAT Attack on Indian Government [2025 Report]](https://blog.darknetsearch.com/wp-content/uploads/2025/10/APT36-malware.jpg)
APT36 Malware Campaign Revealed: Golang-Based DeskRAT Attack on Indian Government [2025 Report]
The APT36 malware campaign has once again shaken the cybersecurity landscape of South Asia. In its latest operation, the Pakistan-linked threat group, also known as Transparent Tribe, launched a Golang-based DeskRAT campaign targeting the Indian government and defense networks. According to recent reports from The Hacker News, the attackers employed sophisticated social engineering and cross-platform…
-

GCash Data Breach 2025 Revealed: Key Facts, Risks & Proof from the Dark Web
The GCash data breach has sent shockwaves across the Philippine fintech community, raising concerns among millions of mobile wallet users. Reports surfaced on October 25, 2025, claiming that sensitive GCash KYC data—including eKYC records, linked bank accounts, and personal information—has been put up for sale on a dark web forum. The alleged leak, reportedly spanning…
