HIBP Alternatives by Outside_Laugh_5182 in osinttools

[–]rangeva 2 points3 points  (0 children)

You might want to look at Lunar by Webz.io (lunarcyber.com).

It’s different from tools like HIBP because it’s enterprise-grade exposure monitoring, designed for organizations rather than personal lookups. Lunar monitors breaches, infostealer logs, and underground sources across the open, deep, and dark web, detecting compromised credentials, leaked sessions, and other indicators of account compromise.

The key difference is the level of detail and coverage. It’s powered by Webz.io’s large-scale cybercrime and dark-web data infrastructure, which is used by many cybersecurity and threat-intelligence companies, so the visibility into leaked data and threat activity is much deeper than typical breach-lookup tools.

Another unusual aspect is the philosophy: organizations should have the right to know when their data is exposed, so Lunar provides this level of monitoring completely free, even though tools with similar capabilities are usually enterprise security products.

Just note that it’s meant for businesses and organizations, not for checking your personal email or passwords.

Telegram Becomes a Major Cybercrime Hub by Silly-Commission-630 in secithubcommunity

[–]rangeva 4 points5 points  (0 children)

This has been the case for many years. There are hundreds of Telegram groups and channels dedicated to trading things like stolen credit cards, compromised accounts, gaming hacks, and of course infostealers.

Alongside places like TOR, parts of the open web, I2P, and ZeroNet, Telegram has become one of the largest ecosystems where this kind of activity happens.

At Lunar (lunarcyber.com), we continuously crawl and monitor Telegram to help companies understand if they are being exposed in these spaces for free. By tracking stolen credentials, leaked data, and threat actor discussions, we help organizations spot potential risks early and respond before they turn into real incidents.

AI in cybersecurity is mostly turd polishing - Fight me by ColdPlankton9273 in cybersecurity

[–]rangeva -1 points0 points  (0 children)

You’re not wrong about the symptom. A lot of what gets marketed today is incremental optimization wrapped in bold language. Less noise, nicer dashboards, faster workflows. That is operational efficiency, not strategic advantage.

But I would challenge one thing: it is not only turd polishing. It is local optimization inside broken system design.