Our
Blog

Cyber threats and Dark Web trends from the experts at Sixgill

MOBILE BANKING MALWARE 101

As smartphone penetration continues to rise, people rely on their mobiledevices to provide near constant access to information. The importance ofconnectivity has made such devices an essential part of one’s personaland work life, allowing users.

5 Scary Trends We Found On The Dark Web

The Dark Web provides the one thing threat actors crave more than anything: complete anonymity. The ability to disconnect online identities from the real-world creates a digital wild west. In the Dark Web, threat actors (can and do) hang out.

Cybersecurity Threat Intelligence: Luxury or Necessity?

The Deep Web is the principal repository of all our most sensitive information. Government agencies, financial service companies, healthcare providers, universities, and law enforcement agencies all store significant amounts of data there. 

Chinese Threat Actors’ Dark Web Activities on Telegram

Beyond Chinese dark, deep and open web forums and blogs, and like popularinstant messaging apps such as WeChat and QQ, Telegram is an unlikely platformfor Chinese threat actors in which to operate considering it is completely censoredin China..

23 million stolen credit cards for sale on the dark web in the first half of 2019

American credit and debit card data is disproportionately found in illicit markets in which cyber criminals buy and sell them. 

We recently examined underground markets on the dark web for stolen credit card information and found over 23 million.

CHINA’S UNIQUE PLATFORMS FOR CYBER THREAT ACTORS: WECHAT AND QQ

China has developed distinct software, unparalleled with the west. The best known example is Wechat, owned by Tencent. Wechat boasts over a billion users – one of the most popular apps in the world. While Wechat services are plenty – ranging from.

[Guest Blog] SixGill: Your Eyes On The Deep And Dark Web

Expert Insights met SixGill’s Barry Spielman to talk about how their platform is helping businesses to identify threats on the Deep and Dark Web by looking at it ‘like a social network.

The Challenge Behind Cyber Intelligence

Intelligence has many different faces. The simplest way to describe intelligence might be - information discovery for a certain purpose. Now, there are lots of types of information, thousands of ways of discovering it, and clearly numerous.

What the Autonomous Vehicle Industry Is Not Telling Us

Evaluations of autonomous car companies as well as private investment in these companies are booming as billions of dollars are being channeled into the commercialization of autonomous car technology.

The Changing Face of the Cyber-Criminal Underground Playground

The underground has long been providing a haven for the malicious activities of cyber threat actors. By creating a greenhouse for the obtaining of tools and affiliates for a cyber-attack, the underground platforms have practically become the.

Don’t miss out on the latest

Get notified on Industry updates.
we promise not to spam