Skip to content

Popular

Top threat intelligence news stories.

Breaking the Russian boycott

Breaking the Russian boycott

Russian dark web actors use underground markets to move money and purchase illicit goods, despite the Western embargo. When a banned product is in high demand, there is opportunity for a black market to thrive. Considering the extent of Western governmental and private sector sanctions against Russia in response to

Hack To School

Hack To School

Compromised university credentials and endpoints on the dark web could cost students and schools millions. Introduction Possession of a student’s university account is desirable for threat actors. It enables them to impersonate the student and steal their identity. More advanced threat actors can use this as the first step

Homemade Firearms on the Dark Web

Homemade Firearms on the Dark Web

On July 8, an assassin killed former Japanese Prime Minister Shinzo Abe with a homemade firearm. The assassination jumpstarted discussions in the media about how easy it is for an individual to learn how to build their own weapon.There is a wide variety of privately made firearms, also known

Are Dark Web Crypto Exchanges Experiencing a Bank Run

Are Dark Web Crypto Exchanges Experiencing a Bank Run

Since it reached a peak of over $64,000 in November, 2021, the price of bitcoin has plummeted, at one point falling over 70%. Other cryptocurrencies, such as Ethereum and Monero, have dropped similar amounts, wiping out $1.8 trillion in total value. When a currency drops in value so

Dox of US Supreme Court Justices

Dox of US Supreme Court Justices

Doxing, which comes from the word “document,” is the act of publicly releasing a rival’s identity and personal details, and it is often used as a form of harassment and intimidation. While not all dark websites permit doxing, there are certain ones that exist for this purpose. While doxing

A guide to APTs on the Deep and Dark Web

A guide to APTs on the Deep and Dark Web

The term advanced persistent threat (APT) refers to cyber criminals with sophisticated capabilities and strong motivations - whether political (state-sponsored), financial (cybercrime), or ideological (hacktivism) - for targeted attacks. APTs are generally groups, occasionally with an international presence. In addition to a deep knowledge of computers and networking, they may

How Cyber Attackers Use Black Hat SEO to Gain Access to Information

How Cyber Attackers Use Black Hat SEO to Gain Access to Information

In today’s digitally-enabled and digitally-focused world, we have become voracious consumers of online content, scrolling through never-ending digital feeds that are perfectly curated to maintain our interest. The pace of technological advancement has also created a culture of instant gratification, with internet users expecting instant response times, rapid results

4 Steps to Create an Effective Threat-Hunting Roadmap

4 Steps to Create an Effective Threat-Hunting Roadmap

For those companies and organizations that have the most at stake when it comes to cybersecurity, threat hunting is a powerful tool for proactively looking for evidence of a cyberattack. But, as we explained in what security teams need to know about threat hunting, threat hunting is a complex and