December 15, 2025 Dark Web ID v2.78.00 release notes

Enhancements

This release introduces several enhancements aimed at improving security measures, along with performance updates to ensure a smoother and more efficient user experience.

  • Active User Filtering for Partner Agents: Partner Agents can now manage Active User Filtering within the organizations table, a feature that was previously exclusive to Partner Administrators. Users with the Partner Agent role can add or remove directories through a user-friendly pop-up interface. For more information on Active User Filtering, refer to Overview of the Active User Filtering feature.

  • We have significantly upgraded the Export to PDF functionality for Dark Web ID compromises. The export now provides a comprehensive detailed report rather than just a high-level summary. Instead of a simple table, the new PDF export generates a full report layout.

    • Full PII visibility: Previously, exports only listed the exposed password and counted the types of Personally Identifiable Information (PII). The new report includes specific details of all exposed PII associated with the compromise.

    • Actionable data: You can now access all necessary contexts in a single offline document, making it easier to share findings with stakeholders or clients.

  • Removal of integration with Passly SSO: The updates encompass the following modifications:

    • The Log In with Passly button has been removed from the SMB add/edit pages, partner add/edit pages, and the login page.

    • The Login with Passly checkbox has been eliminated from the My Organization settings page.

Please note that Passly will be shut down on December 31st. For more information, refer to Passly End of Life notice.

Bug fixes

  • Password masking implementation: The Live Data Search API has been updated to ensure that passwords are now partially masked in API responses, aligning with UI standards. The first four characters will remain visible, with subsequent characters replaced by asterisks (*). For longer passwords, an ellipsis (...) will indicate truncation. This enhancement is crucial for maintaining security and protecting user information during API interactions.

  • Customers experienced authentication failures while connecting to the ConnectWise On-Prem API. Connectivity issues were resolved, and the integration now functions properly.