| Date | Title | Description |
| 17.02.2026 | Ransomware “Supergroups” Emerge After Record‑Breaking Year of Attacks | The number of active ransomware groups reached an all-time high in the second half of 2025, according to new figures from Searchlight Cyber, with ransomware groups listing a record 7,458 victims on dark web leak sites.
The cyber firm’s late... |
| 28.10.2025 | Searchlight Cyber Acquires Cyber Risk Management Company INTANGIC | Strategic acquisition strengthens Searchlight Cyber’s External Cyber Risk Management offering and deepens its expertise in cyber risk quantification
PORTSMOUTH, UNITED KINGDOM, October 28, 2025 /EINPresswire.com/ -- Searchlight Cyber has ac... |
| 09.09.2025 | SEARCHLIGHT CYBER LAUNCHES AI RESEARCH ASSISTANT TO GUIDE AND FREE UP TIME FOR INVESTIGATORS | This AI capability that enables investigators to use natural language queries to rapidly access intelligence from dark web markets, forums, & ransomware groups
PORTSMOUTH , UNITED KINGDOM, September 9, 2025 /EINPresswire.com/ -- Searchl... |
| 11.08.2025 | Searchlight Cyber Launches Free Open Source Tools Site for the Cybersecurity Community | Three new tools are launched with the site and existing tools like Wordlists have been enhanced
DEFCON, LAS VEGAS. BRISBANE, AUSTRALIA, August 11, 2025 /EINPresswire.com/ -- Searchlight Cyber has launched a new site where security professio... |
| 29.07.2025 | Searchlight Cyber Finds Further Critical Vulnerabilities in ADOBE Experience Manager | Three new critical vulnerabilities include two paths to RCE and a pre-authentication XXE
BRISBANE, AUSTRALIA, July 29, 2025 /EINPresswire.com/ -- The Assetnote Security Research Team at Searchlight Cyber has published the details of three c... |
| 22.07.2025 | Searchlight Cyber Discloses Critical Remote Commnad Execution Vulnerabulity in ETQ Reliance | Vulnerabilities in the popular quality management software could expose highly sensitive data
BRISBANE, AUSTRALIA, July 22, 2025 /EINPresswire.com/ --
The Assetnote Security Research Team at Searchlight Cyber has uncovered a series of vulne... |
| 08.07.2025 | Searchlight Cyber Uncovers High Severity Vulnerability in Open-Source Web Content Management Platform, DNN | The vulnerability is present in multiple software versions (6.0.0 - 10.0.1) and has a severity score of 8.6
BRISBANE, AUSTRALIA, July 8, 2025 /EINPresswire.com/ -- The Assetnote Security Research Team at Searchlight Cyber has uncovered a hi... |
| 01.07.2025 | Searchlight Cyber Finds Three Cross-Site Scripting Vulnerabilities in Adobe Experience Manager | Vulnerabilities could have been used to exploit all 45k sites running the cloud version of AEM
BRISBANE, AUSTRALIA, July 2, 2025 /EINPresswire.com/ -- The Assetnote Security Research Team at Searchlight Cyber has published the details of th... |
| 02.04.2025 | Assetnote Identifies Critical Pre-Auth SQL Injection Vulnerability in Halo ITSM | Assetnote - a Searchlight Cyber company
Vulnerability could be exploited to read, modify, or insert data into critical IT support software
QUEENSLAND, AUSTRALIA, April 2, 2025 /EINPresswire.com/ -- - Assetnote, now a Searchlight Cyber compa... |
| 12.02.2025 | Ransomware Landscape: A Growing Threat in 2025 | The dark web is a wild jungle. In 2024, it became even more chaotic. A new report reveals a staggering 38 percent increase in active ransomware groups. A total of 94 groups were identified, with 49 of them being newcomers. This surge reflec... |
| 11.02.2025 | Number of active dark web ransomware groups up 38 percent in 2024 | A total of 94 ransomware groups listed victims in 2024 (a 38 percent increase on 2023) with 49 new groups observed, according to a new report, reflecting further complexity in the ransomware landscape.
The study from Searchlight Cyber also ... |
| 11.02.2025 | New Ransomware Gangs Drive Surge in Attacks | Almost half of all the ransomware groups listing victims last year were new entrants to the ‘threatscape’, according to the latest research from Searchlight Cyber.
The cybersecurity firm’s new report, Same Game, New Players: Ransomware in 2... |
| 05.11.2024 | Самые горячие новости инфобеза за октябрь 2024 года | Всем привет! Разбираем в нашем ежемесячном дайджесте ключевые новости октября. Так, взлому дважды подвергся The Internet Archive, нанеся серьёзный удар по проекту. Инфраструктура инфостилеров RedLine и Meta была перехвачена, а члены группир... |
| 23.09.2024 | Dark web exposure increases risk of attack | The presence of any data relating to an organization on the dark web demonstrably increases its risk of a cyberattack.
This probably won't come as too much of a surprise but it's confirmed by new research from Searchlight Cyber, the dark we... |
| 03.09.2024 | Ransomware Surge: A Growing Threat in the Digital Shadows | The digital landscape is shifting. A new report from Searchlight Cyber reveals a staggering 56% increase in active ransomware groups compared to last year. This surge paints a grim picture for cybersecurity professionals. The shadows are gr... |
| 03.09.2024 | Number of active ransomware groups increases over 50 percent | A new report from dark web intelligence specialist Searchlight Cyber shows a 56 percent increase in the number of active ransomware groups this year compared to the first half of 2023, reflecting a diversification of the ransomware landscap... |
| 03.09.2024 | New Report Reveals Significant Surge in Active Ransomware Groups | New research from Searchlight Cyber, the cybersecurity and dark web intelligence specialist, has found a worrying increase in the number of active ransomware groups.
According to Searchlight’s most recent report, there were 56% more ransomw... |
| 31.01.2024 | How ransomware has changed and the groups to watch out for in 2024 | Web intelligence company Searchlight Cyber has released a new report on the ransomware landscape of the dark web, highlighting changing tactics and the groups that security teams need to look out for in 2024.
LockBit, BlackCat (also known a... |
| 25.01.2024 | Searchlight Cyber Introduces AI-Powered Language Translation to Decipher the Dark Web | Bespoke AI tool is trained on dark web data to provide accurate translation for cybersecurity professionals and law enforcement
Searchlight Cyber, the dark web intelligence company, has added AI-powered language translation into its dark we... |
| 12.04.2023 | Searchlight Cyber Announces Secure Virtual Browser for Cyber Investigators to Safely Access the Dark Web | Stealth Browser enhances award-winning Cerberus investigation platform by allowing investigators to isolate their infrastructure from malware on the dark web
Searchlight Cyber, the dark web intelligence company, has launched Stealth Browser... |
| 12.04.2023 | Stealth Browser gives cyber-investigators safe and anonymous access to the dark web | In the ever-evolving world of cybersecurity, professionals constantly seek new methods to gather intelligence and stay ahead of cybercriminals. One crucial source of information lies within the dark web, a realm notorious for its potential ... |
| 24.03.2023 | 93 Percent of Enterprise CISOs Concerned About Dark Web Threats | Searchlight Cyber, the dark web intelligence company, today released its report Proactive Defense: How Enterprises Are Using Dark Web Intelligence, which examines how CISOs are gathering data from the dark web to improve their security post... |
| 22.03.2023 | Dark web intelligence is critical to defending the enterprise | A new survey of over a thousand CISOs from large enterprises in the US and UK, finds that 93 percent are concerned about dark web threats and 72 percent believe that intelligence on cybercriminals is critical to defending their organization... |
| 24.12.2022 | Searchlight Security Changes Name to Searchlight Cyber and Launches New Brand | Searchlight Cyber, the dark web intelligence company, has announced its rebrand from Searchlight Security, aligning its legal entity in both the UK (Searchlight Cyber Ltd) and the US (Searchlight Cyber LLC). The name change is accompanied b... |
| 11.05.2020 | Assessing Cyber Risk From External Information | There is a vision for the future of assessing cybersecurity: The goal is a system of cyber metrics that are transparent, auditable, practical, scalable and widely agreed upon. To that end, it is useful—indeed, imperative—to evaluate various... |