Skip to content

Hacking

Hacking trends.

Understanding Chinese Threat Actors

Understanding Chinese Threat Actors

Cybersecurity involves various processes, and it takes the joint work of different intel specialists to thwart the plans of threat actors within the dark web. However, things become even more complex when dealing with hackers from isolated countries such as China. Therefore, it is critical for anyone interested in understanding

How Ransomware Gangs Function

How Ransomware Gangs Function

The number and scope of ransomware gangs' activities grow daily. But not many organizations are aware of the risks these activities carry. Also, the ongoing war in Europe shows that battlefields exist in the digital world and can cause damage that can devastate entire economies and social orders. Therefore, organizations

Threat Hunting to Catch Adversaries, Not Just Stop Attacks

Threat Hunting to Catch Adversaries, Not Just Stop Attacks

Threat hunting needs to evolve from mitigating risk to the pursuit of adversaries. Threat hunting has helped security teams detect and reduce dwell time of breaches. But most of these hunting expeditions focus on threats — leaving the adversary free to launch more attacks with different tactics. Watch our webinar series

‘Tis the Season: Fraudsters Have All the (Re)fun(d)

‘Tis the Season: Fraudsters Have All the (Re)fun(d)

Everyone knows that the best part of the holiday season is returning the stuff you don’t want for cash to buy the stuff you do. But for cybercriminals, every day is the day after Christmas. Our latest research report, “Terms and Conditions Apply: Refund Fraud on the Dark Web”

Tough Pill to Swallow: Dark Web Threats to the Healthcare Industry

Tough Pill to Swallow: Dark Web Threats to the Healthcare Industry

As the world races towards a coronavirus vaccine, the healthcare industry has remained a focal point for cybercriminals. And while threat actors have consistently targeted the industry, and references to healthcare have increased on the underground due to the pandemic. According to data taken from Cybersixgill’s portal, references from

Underground Reveals Popularity of Cyberattacks on Schools

Underground Reveals Popularity of Cyberattacks on Schools

Many schools face a unique breed of insider threat: their own students. Whether motivated by boredom or personal gain, students pose an outsized risk to their own schools. That’s due in large part to the tools and services available to them on the dark web. They can find new

#BreachPlease: How Hackers Outsmart Social Media Platforms

#BreachPlease: How Hackers Outsmart Social Media Platforms

It’s getting harder for criminals to fake their way to social media fame. Yes, people can still buy followers and engagement. But the process isn’t exactly simple. It’s more expensive and requires more skill. Researchers at Cybersixgill recently examined the market for social media hacking on the

Bending the Curve: Rising Fraud on Payment Platforms Amid COVID-19

Bending the Curve: Rising Fraud on Payment Platforms Amid COVID-19

Threat actors and fraudsters have a long history of finding opportunity in crisis. Financial fraud increased drastically after the attacks on 9/11, and after the 2008 downturn. New research from Cybersixgill shows just how quickly criminal schemes can react to changes in the economy. Between March 2020 and May

Your Front Door is Actually a Backdoor

Your Front Door is Actually a Backdoor

The IoT industry is booming: from connected cars to traffic lights, home security systems, connected toys and smart speakers, the IoT market has been growing for some time and is due to reach 31 billion connected devices by 2020 and 75 billion devices by 2025. Internet-connected home devices like Alexa,