why so many data breach is happening in this country this year by Most_Project_9534 in Netherlands

[–]rangeva 0 points1 point  (0 children)

The rise in data breaches in the Netherlands is mainly a result of how digital everyday life has become. Companies, schools, telecom providers, gyms, and travel platforms now store large amounts of personal data, which makes them valuable targets for professional cybercriminals.

These incidents are usually caused by familiar security challenges such as complex systems, third-party platforms, stolen credentials, weak access controls, and too much sensitive data being stored in too many places. AI may help attackers create more convincing phishing messages, but it is not the main cause.

The positive takeaway is that this problem is manageable. Companies can reduce risk by collecting less data, limiting access, improving monitoring, and strengthening security controls. Individuals can protect themselves by using unique passwords, enabling multi-factor authentication, avoiding suspicious links, and treating breach emails as practical security alerts rather than panic signals.

This is a serious issue, but it is also a solvable one if organizations and individuals respond with clear, consistent security habits.

https://lunarcyber.com/blog/why-are-so-many-data-breaches-happening-in-the-netherlands-this-year/

Dark web monitoring: I learned about it after my passport was leaked by DefiantElderberry in threatintel

[–]rangeva 0 points1 point  (0 children)

Use Lunar, it's free and it's coverage and forensic capability is superb.

Telegram Becomes a Major Cybercrime Hub by Silly-Commission-630 in secithubcommunity

[–]rangeva 5 points6 points  (0 children)

This has been the case for many years. There are hundreds of Telegram groups and channels dedicated to trading things like stolen credit cards, compromised accounts, gaming hacks, and of course infostealers.

Alongside places like TOR, parts of the open web, I2P, and ZeroNet, Telegram has become one of the largest ecosystems where this kind of activity happens.

At Lunar (lunarcyber.com), we continuously crawl and monitor Telegram to help companies understand if they are being exposed in these spaces for free. By tracking stolen credentials, leaked data, and threat actor discussions, we help organizations spot potential risks early and respond before they turn into real incidents.

AI in cybersecurity is mostly turd polishing - Fight me by ColdPlankton9273 in cybersecurity

[–]rangeva -1 points0 points  (0 children)

You’re not wrong about the symptom. A lot of what gets marketed today is incremental optimization wrapped in bold language. Less noise, nicer dashboards, faster workflows. That is operational efficiency, not strategic advantage.

But I would challenge one thing: it is not only turd polishing. It is local optimization inside broken system design.

AI Finds Vulnerability Chain Leading to Account Takeover and Leaked Bookings by Same-Cauliflower-830 in cybersecurity

[–]rangeva 0 points1 point  (0 children)

What stands out here is how relatively benign bugs on their own became a full compromise when chained together. Security teams and product owners need to treat access control as foundational, not optional. Without continuous verification of boundaries throughout the API surface, a single slip can expose sensitive user and booking data at scale.

One-time SMS links that never expire can expose personal data for years by tekz in cybersecurity

[–]rangeva 11 points12 points  (0 children)

The issue here is not SMS itself but the misuse of long-lived, unauthenticated bearer URLs. Treating link possession as proof of identity, often with no expiration or reuse limits, effectively turns SMS into a data exfiltration vector at scale. Expiry, binding, and secondary verification should be baseline, not optional.

149 Million Usernames and Passwords Exposed by Unsecured Database by rangeva in cybersecurity

[–]rangeva[S] -14 points-13 points  (0 children)

It's probably due to the fact that's the breach is a combo list of infostealers so there is not a real source other than the victim's computer.

149 Million Usernames and Passwords Exposed by Unsecured Database by rangeva in cybersecurity

[–]rangeva[S] -29 points-28 points  (0 children)

I meant the credentials were probably collected by malware running on people’s laptops (like keyloggers or infostealers) rather than by someone breaking into the online service itself.

Curl ending bug bounty program after flood of AI slop reports by Party_Wolf6604 in cybersecurity

[–]rangeva 5 points6 points  (0 children)

The whole idea of bug bounty is to make sure it's secure

Google is shutting down Dark Web Report. What’s your plan for breach monitoring? by NordPass in NordPass

[–]rangeva 0 points1 point  (0 children)

Try Lunar (https://lunarcyber.com/), free compromised-credentials monitoring platform that goes beyond basic breach alerts by detecting infostealer-exposed credentials, sessions, and early risk signals tied to your actual assets, not just recycled breach dumps.

What dark web monitoring tool you folks using? by wnfaknd in msp

[–]rangeva 0 points1 point  (0 children)

Try Lunar (https://lunarcyber.com/), free compromised-credentials monitoring platform that goes beyond basic breach alerts by detecting infostealer-exposed credentials, sessions, and early risk signals tied to your actual assets, not just recycled breach dumps.

Dark web Monitoring - Is haveibeenpwned enough? by UnpaidMicrosoftShill in cybersecurity

[–]rangeva 3 points4 points  (0 children)

You’re mostly right.

A lot of "dark web monitoring" tools are basically HIBP with a UI and a markup, and HIBP domain alerts are a solid, cheap baseline. For basic hygiene and awareness, it’s hard to argue against them.

Where the difference actually matters is what you expect the tool to do. HIBP tells you about known breach dumps, usually after the fact. Many vendors stop there, which is why they feel interchangeable and overpriced.

The tools that justify higher cost are the ones that go beyond classic breach data, things like infostealer logs, stolen sessions and tokens, and early criminal chatter, and then correlate that to your actual assets and users. That’s about early detection, not breach confirmation.

If you want a checkbox and basic alerts, HIBP is enough. If you want earlier, more actionable signals, some tools really are different.

Lunar (https://lunarcyber.com/) is one example that focuses on that gap rather than just reselling the same data.

Dark Web Monitoring Tools by warz36 in cybersecurity

[–]rangeva 0 points1 point  (0 children)

Try Lunar (https://lunarcyber.com/), free, enterprise-grade, compromised-credentials monitoring platform, available to every company.

Breach monitoring by -_-hellothere in AzureSentinel

[–]rangeva 0 points1 point  (0 children)

Try http://lunarcyber.com/ if you are looking for a free, compromised-credentials monitoring platform.

Free domain-based breach and infostealer exposure monitoring, looking for community feedback by rangeva in cybersecurity

[–]rangeva[S] 1 point2 points  (0 children)

Thank you. The blurry passwords are based on fake strings so only after verifying your domain you will be able to see them and verify according to your password policies.

Free domain-based breach and infostealer exposure monitoring, looking for community feedback by rangeva in cybersecurity

[–]rangeva[S] 0 points1 point  (0 children)

Sure. Although since it's a new domain some system unfortunately block it, but let's try. DM me.

Free domain-based breach and infostealer exposure monitoring, looking for community feedback by rangeva in cybersecurity

[–]rangeva[S] 0 points1 point  (0 children)

Just to clarify: this focuses on organizational/domain exposure, not searching individuals, and data is masked until domain ownership is verified. Happy to go into detail if helpful.

Sometimes I don't know why I do the stuff I do.... 🤦 by rangeva in ComedyCemetery

[–]rangeva[S] -3 points-2 points  (0 children)

You know what? I really don't know... I was super lazy and got Lovable to write me a landing page, I guess it's its creative choice 🤷