February 27, 2026 Dark Web ID v2.83.00 release notes
Enhancements
This release delivers targeted enhancements that improve performance, strengthen security, and refine data export workflows.
Exporting all compromises to CSV is now more consistent and scalable
We have enhanced the Export All Compromises to CSV capability to provide a more consistent, scalable, and investigation‑ready export experience. The updated export uses the same standardized template introduced for exporting user-selected compromises, delivering a cleaner structure that supports offline analysis and integration with third‑party security tools and internal workflows.
Key details include the following:
-
A standardized CSV structure consistent with the format used for exporting user-selected compromises.
-
All visible compromises are exported based on the current UI search and filter criteria
-
Compromises are ordered by the date added to Dark Web ID
-
CSV generation is optimized for large datasets, improving performance and reliability
-
PII filtering and password visibility controls continue to respect user permissions
NOTE Unlike exports of user-selected compromises, the Export All Compromises to CSV report does not include compromise notes.
This update improves consistency across export workflows while ensuring scalability for organizations exporting large volumes of compromise data.
Exported PDFs for user-selected compromises now include email address and monitored value
We improved the ability to export user-selected compromises to PDF, enhancing investigation accuracy and report clarity when analyzing email‑based compromises. Previously, IP‑based compromises could include email addresses, but the PDF export did not consistently display this information. The updated PDF export now includes the relevant email address and monitored value for selected compromise records.
Key details include the following:
-
Email address is displayed for email‑based and IP‑based compromises where applicable
-
The monitored value is clearly shown based on monitored type (email, domain, IP address)
-
The Origin field has been repositioned to improve report readability
-
The Email field is displayed under Monitored Type when applicable
-
The PDF header for selected compromises now includes the monitored value and email address (if available), with report‑generation metadata added to the export
This enhancement ensures PDF exports provide a complete, investigation‑ready view of compromise data and aligns the PDF format more closely with the on‑screen experience and other export workflows.
Additional notes
BullPhish ID content removal from legacy reports
BullPhish ID–related content has been removed from Dark Web ID legacy reports. Future reports will no longer include BullPhish ID overview or campaign sections.
