
Threat actor selling sophisticated Android malware
For just $300, purchasers can use malware to gain access to Android devices.
Hacking trends.
For just $300, purchasers can use malware to gain access to Android devices.
For opening bid of $3000, purchasers can gain access to shops’ checkout pages and databases.
Cybersecurity involves various processes, and it takes the joint work of different intel specialists to thwart the plans of threat actors within the dark web. However, things become even more complex when dealing with hackers from isolated countries such as China. Therefore, it is critical for anyone interested in understanding
The number and scope of ransomware gangs' activities grow daily. But not many organizations are aware of the risks these activities carry. Also, the ongoing war in Europe shows that battlefields exist in the digital world and can cause damage that can devastate entire economies and social orders. Therefore, organizations
What's happening between Russia and China in the cyber underground?
Threat hunting needs to evolve from mitigating risk to the pursuit of adversaries. Threat hunting has helped security teams detect and reduce dwell time of breaches. But most of these hunting expeditions focus on threats — leaving the adversary free to launch more attacks with different tactics. Watch our webinar series
This webinar reveals insights and details about how fraudsters are leveraging the dark web marketplaces and the processes by which online criminals are monetizing these types of attacks. Learn more
The business world has been abuzz about the Okta breach that occurred earlier this week. Okta was transparent about how it happened – and people have been questioning who is behind LAPSUS$, the group that carried out the attack. But there is a lot more to the story than meets the
Everyone knows that the best part of the holiday season is returning the stuff you don’t want for cash to buy the stuff you do. But for cybercriminals, every day is the day after Christmas. Our latest research report, “Terms and Conditions Apply: Refund Fraud on the Dark Web”
As the world races towards a coronavirus vaccine, the healthcare industry has remained a focal point for cybercriminals. And while threat actors have consistently targeted the industry, and references to healthcare have increased on the underground due to the pandemic. According to data taken from Cybersixgill’s portal, references from
A sign of the times? It looks like even the dark web has a serious case of election fever. With tomorrow’s presidential election generating tremendous interest in the U.S. and around the world, both the candidates and the election’s major issues have recently been popular topics of
Many schools face a unique breed of insider threat: their own students. Whether motivated by boredom or personal gain, students pose an outsized risk to their own schools. That’s due in large part to the tools and services available to them on the dark web. They can find new
It’s getting harder for criminals to fake their way to social media fame. Yes, people can still buy followers and engagement. But the process isn’t exactly simple. It’s more expensive and requires more skill. Researchers at Cybersixgill recently examined the market for social media hacking on the
Threat actors and fraudsters have a long history of finding opportunity in crisis. Financial fraud increased drastically after the attacks on 9/11, and after the 2008 downturn. New research from Cybersixgill shows just how quickly criminal schemes can react to changes in the economy. Between March 2020 and May
The gaming business shows no signs of slowing down as technology continues to improve, and threat actors are taking notice.