• Home
  • Blog
  • AlphaHunt Intelligence
  • Privacy
  • TOS
CSIRTGadgets

[FORECAST] ShinyHunters SaaS Data Theft: Why Non-Ransom Monetization Looks Increasingly Attractive

[FORECAST] ShinyHunters SaaS Data Theft: Why Non-Ransom Monetization Looks Increasingly Attractive

Ransom is a tactic. Liquidity is the strategy.

Our new forecast asks: will ShinyHunters make more in 2H 2026 by selling SaaS access/data than by getting paid? Signals say yes. 🕵️‍♂️💸☁️

Iran’s Internet Went to Zero on Jan 8—Will Account Takeovers Spike in the Next 2–3 Weeks?

Iran’s Internet Went to Zero on Jan 8—Will Account Takeovers Spike in the Next 2–3 Weeks?

Iran’s internet goes dark → attackers don’t stop. They speed-run creds and hit post-auth collection the moment connectivity blips back. ⏱️🔑👀

[FORECAST] CoPhish: The Microsoft Copilot Link That Hands Over Your OAuth Tokens

[FORECAST] CoPhish: The Microsoft Copilot Link That Hands Over Your OAuth Tokens

Phishing got a low-code upgrade. 🤖🔑
Copilot Studio links can look “safe” because they’re hosted where users expect… then the OAuth consent click does the rest. 🧯
We’re forecasting the first publicly confirmed Copilot Studio → OAuth → M365 data breach by 12/31/26 (56%).

VoidProxy: AitM Phishing-as-a-Service Quietly Bypasses MFA at Scale

VoidProxy: AitM Phishing-as-a-Service Quietly Bypasses MFA at Scale

VoidProxy: AitM Phishing-as-a-Service Quietly Bypasses MFA at Scale

The Cutting Edge of eCrime Research is...

The Cutting Edge of eCrime Research is...

If you haven’t checked out THE eCrime conference, you’re…

How to Hunt for Phishing Domains using TensorFlow

How to Hunt for Phishing Domains using TensorFlow

How to scale your phishing detection to millions of attacks per day- with just $4,000 and a laptop.

Did you learn something new?
 

Categories

cif csirtg marketing rant research smrt tools
  • Contact
  • AlphaHunt Intelligence
© 2025 CSIRT Gadgets, LLC
All rights reserved