Live: 701 compromised institutions tracked Report a Breach Contact System Status
Research

Field-grade reports on the compromised institutional web.

AbuseRadar publishes quarterly threat briefings, methodology notes and structured datasets on active operator stacks compromising government, academic and public-sector infrastructure. Free for CERT teams, journalists and academic researchers; everyone else by request.

Sector report

Compromised .gov.* domains: a 6-month longitudinal study.

82 active municipal and central-government compromises tracked across 11 jurisdictions. Time-to-detection, time-to-remediation and recurrence rates.

34 pages · March 2026 Request →
Sector report

Universities as link farms: the abandoned-subdomain epidemic.

247 active higher-education compromises. CMS provenance, faculty-page pattern, operator overlap with the gambling stack, recommended audit playbook.

41 pages · March 2026 Request →
Methodology note

Cloaking-aware crawl: defeating residential-IP detection.

How AbuseRadar's verification stack renders compromised pages exactly as the attacker serves them — including the failure modes of common SEO tools.

18 pages · February 2026 Read →
Dataset

Public attacker-domain dataset (sanitised).

3,745 attacker domains, operator cluster IDs, first-seen / last-seen dates, target sector mix. CSV + JSON. Updated weekly. Free for CERT and academic use.

Last updated: this week Request access →
Press

Working with journalists.

Investigative journalists working a compromise story: AbuseRadar will share the underlying evidence bundle, attacker attribution and timeline under embargo. We do not pitch.

No sales calls

Subscribe to the quarterly briefing.

Email-only. Four times a year. Each issue: top operator stacks, sector compromise rates, takedown wins and one deep-dive case study.