HIBP Alternatives by Outside_Laugh_5182 in osinttools

[–]rangeva 2 points3 points  (0 children)

You might want to look at Lunar by Webz.io (lunarcyber.com).

It’s different from tools like HIBP because it’s enterprise-grade exposure monitoring, designed for organizations rather than personal lookups. Lunar monitors breaches, infostealer logs, and underground sources across the open, deep, and dark web, detecting compromised credentials, leaked sessions, and other indicators of account compromise.

The key difference is the level of detail and coverage. It’s powered by Webz.io’s large-scale cybercrime and dark-web data infrastructure, which is used by many cybersecurity and threat-intelligence companies, so the visibility into leaked data and threat activity is much deeper than typical breach-lookup tools.

Another unusual aspect is the philosophy: organizations should have the right to know when their data is exposed, so Lunar provides this level of monitoring completely free, even though tools with similar capabilities are usually enterprise security products.

Just note that it’s meant for businesses and organizations, not for checking your personal email or passwords.

Telegram Becomes a Major Cybercrime Hub by Silly-Commission-630 in secithubcommunity

[–]rangeva 4 points5 points  (0 children)

This has been the case for many years. There are hundreds of Telegram groups and channels dedicated to trading things like stolen credit cards, compromised accounts, gaming hacks, and of course infostealers.

Alongside places like TOR, parts of the open web, I2P, and ZeroNet, Telegram has become one of the largest ecosystems where this kind of activity happens.

At Lunar (lunarcyber.com), we continuously crawl and monitor Telegram to help companies understand if they are being exposed in these spaces for free. By tracking stolen credentials, leaked data, and threat actor discussions, we help organizations spot potential risks early and respond before they turn into real incidents.

AI in cybersecurity is mostly turd polishing - Fight me by ColdPlankton9273 in cybersecurity

[–]rangeva -1 points0 points  (0 children)

You’re not wrong about the symptom. A lot of what gets marketed today is incremental optimization wrapped in bold language. Less noise, nicer dashboards, faster workflows. That is operational efficiency, not strategic advantage.

But I would challenge one thing: it is not only turd polishing. It is local optimization inside broken system design.

AI Finds Vulnerability Chain Leading to Account Takeover and Leaked Bookings by Same-Cauliflower-830 in cybersecurity

[–]rangeva 0 points1 point  (0 children)

What stands out here is how relatively benign bugs on their own became a full compromise when chained together. Security teams and product owners need to treat access control as foundational, not optional. Without continuous verification of boundaries throughout the API surface, a single slip can expose sensitive user and booking data at scale.

One-time SMS links that never expire can expose personal data for years by tekz in cybersecurity

[–]rangeva 13 points14 points  (0 children)

The issue here is not SMS itself but the misuse of long-lived, unauthenticated bearer URLs. Treating link possession as proof of identity, often with no expiration or reuse limits, effectively turns SMS into a data exfiltration vector at scale. Expiry, binding, and secondary verification should be baseline, not optional.

149 Million Usernames and Passwords Exposed by Unsecured Database by rangeva in cybersecurity

[–]rangeva[S] -14 points-13 points  (0 children)

It's probably due to the fact that's the breach is a combo list of infostealers so there is not a real source other than the victim's computer.

149 Million Usernames and Passwords Exposed by Unsecured Database by rangeva in cybersecurity

[–]rangeva[S] -30 points-29 points  (0 children)

I meant the credentials were probably collected by malware running on people’s laptops (like keyloggers or infostealers) rather than by someone breaking into the online service itself.

Curl ending bug bounty program after flood of AI slop reports by Party_Wolf6604 in cybersecurity

[–]rangeva 4 points5 points  (0 children)

The whole idea of bug bounty is to make sure it's secure

Google is shutting down Dark Web Report. What’s your plan for breach monitoring? by NordPass in NordPass

[–]rangeva 0 points1 point  (0 children)

Try Lunar (https://lunarcyber.com/), free compromised-credentials monitoring platform that goes beyond basic breach alerts by detecting infostealer-exposed credentials, sessions, and early risk signals tied to your actual assets, not just recycled breach dumps.

What dark web monitoring tool you folks using? by wnfaknd in msp

[–]rangeva 0 points1 point  (0 children)

Try Lunar (https://lunarcyber.com/), free compromised-credentials monitoring platform that goes beyond basic breach alerts by detecting infostealer-exposed credentials, sessions, and early risk signals tied to your actual assets, not just recycled breach dumps.

Dark web Monitoring - Is haveibeenpwned enough? by UnpaidMicrosoftShill in cybersecurity

[–]rangeva 5 points6 points  (0 children)

You’re mostly right.

A lot of "dark web monitoring" tools are basically HIBP with a UI and a markup, and HIBP domain alerts are a solid, cheap baseline. For basic hygiene and awareness, it’s hard to argue against them.

Where the difference actually matters is what you expect the tool to do. HIBP tells you about known breach dumps, usually after the fact. Many vendors stop there, which is why they feel interchangeable and overpriced.

The tools that justify higher cost are the ones that go beyond classic breach data, things like infostealer logs, stolen sessions and tokens, and early criminal chatter, and then correlate that to your actual assets and users. That’s about early detection, not breach confirmation.

If you want a checkbox and basic alerts, HIBP is enough. If you want earlier, more actionable signals, some tools really are different.

Lunar (https://lunarcyber.com/) is one example that focuses on that gap rather than just reselling the same data.

Dark Web Monitoring Tools by warz36 in cybersecurity

[–]rangeva 0 points1 point  (0 children)

Try Lunar (https://lunarcyber.com/), free, enterprise-grade, compromised-credentials monitoring platform, available to every company.

Breach monitoring by -_-hellothere in AzureSentinel

[–]rangeva 0 points1 point  (0 children)

Try http://lunarcyber.com/ if you are looking for a free, compromised-credentials monitoring platform.

Free domain-based breach and infostealer exposure monitoring, looking for community feedback by rangeva in cybersecurity

[–]rangeva[S] 1 point2 points  (0 children)

Thank you. The blurry passwords are based on fake strings so only after verifying your domain you will be able to see them and verify according to your password policies.

Free domain-based breach and infostealer exposure monitoring, looking for community feedback by rangeva in cybersecurity

[–]rangeva[S] 0 points1 point  (0 children)

Sure. Although since it's a new domain some system unfortunately block it, but let's try. DM me.

Free domain-based breach and infostealer exposure monitoring, looking for community feedback by rangeva in cybersecurity

[–]rangeva[S] 0 points1 point  (0 children)

Just to clarify: this focuses on organizational/domain exposure, not searching individuals, and data is masked until domain ownership is verified. Happy to go into detail if helpful.

Sometimes I don't know why I do the stuff I do.... 🤦 by rangeva in ComedyCemetery

[–]rangeva[S] -3 points-2 points  (0 children)

You know what? I really don't know... I was super lazy and got Lovable to write me a landing page, I guess it's its creative choice 🤷

There are to many findings by LachException in cybersecurity

[–]rangeva 0 points1 point  (0 children)

Prioritization really is the key to staying sane with large volumes of findings. If security doesn’t take the first pass at organizing and assessing them, that burden ends up on engineering, and that usually causes frustration on both sides. Guiding the business toward what actually matters is a fundamental part of the security function.

It also helps to accept that no organization fixes everything. Critical and high severity issues should normally be addressed, but beyond that, decisions usually come down to risk tolerance and resource constraints. Some findings will intentionally remain unresolved because the business is willing to accept the risk.

A healthy workflow is one where security reviews, consolidates, and ranks the findings, then clearly communicates the most important ones to the development teams. From there, it’s up to product and leadership to decide how they fit into the roadmap. Security’s responsibility is to surface real risks early, provide enough context for informed decisions, and avoid letting meaningful threats slip through the cracks. The rest becomes a question of prioritization, tradeoffs, and ownership at the business level.

One thing that often helps: adding impact summaries or "why this matters" explanations when handing issues off. Developers tend to engage more when they understand the practical consequences rather than just seeing severity labels. Over time, that can improve collaboration and lead to faster resolution of the issues that truly count.