Our
Blog

Cyber threats and Dark Web trends from the experts at Sixgill

What is driving SIM Swapping chatter on the dark web?

For years, security advocates have urged the use of two-factor authentication. The premise was simple: since passwords can be stolen, you need an additional level of security. Usually, that meant sending a PIN to a user’s smartphone by SMS.

What.

Top 21 Cybersecurity & Threat Intelligence Events in 2020

Making time for cybersecurity events is a great way to keep pace, network with colleagues, and discuss new innovations. We’ve researched what’s out there and are happy to share our findings with you. While not an exhaustive list, the following.

Click Fraud for Sale on the Dark Web

The digital advertising market generated an estimated $283 billion in 2018.

MOBILE BANKING MALWARE 101

As smartphone penetration continues to rise, people rely on their mobiledevices to provide near constant access to information. The importance ofconnectivity has made such devices an essential part of one’s personaland work life, allowing users.

5 Scary Trends We Found On The Dark Web

The Dark Web provides the one thing threat actors crave more than anything: complete anonymity. The ability to disconnect online identities from the real-world creates a digital wild west. In the Dark Web, threat actors (can and do) hang out.

Cybersecurity Threat Intelligence: Luxury or Necessity?

The Deep Web is the principal repository of all our most sensitive information. Government agencies, financial service companies, healthcare providers, universities, and law enforcement agencies all store significant amounts of data there. 

Chinese Threat Actors’ Dark Web Activities on Telegram

Beyond Chinese dark, deep and open web forums and blogs, and like popularinstant messaging apps such as WeChat and QQ, Telegram is an unlikely platformfor Chinese threat actors in which to operate considering it is completely censoredin China..

23 million stolen credit cards for sale on the dark web in the first half of 2019

American credit and debit card data is disproportionately found in illicit markets in which cyber criminals buy and sell them. 

We recently examined underground markets on the dark web for stolen credit card information and found over 23 million.

CHINA’S UNIQUE PLATFORMS FOR CYBER THREAT ACTORS: WECHAT AND QQ

China has developed distinct software, unparalleled with the west. The best known example is Wechat, owned by Tencent. Wechat boasts over a billion users – one of the most popular apps in the world. While Wechat services are plenty – ranging from.

[Guest Blog] SixGill: Your Eyes On The Deep And Dark Web

Expert Insights met SixGill’s Barry Spielman to talk about how their platform is helping businesses to identify threats on the Deep and Dark Web by looking at it ‘like a social network.

Don’t miss out on the latest

Get notified on Industry updates.
we promise not to spam