Our
Blog

Cyber threats and Dark Web trends from the experts at Sixgill

The Challenge Behind Cyber Intelligence

Intelligence has many different faces. The simplest way to describe intelligence might be - information discovery for a certain purpose. Now, there are lots of types of information, thousands of ways of discovering it, and clearly numerous.

What the Autonomous Vehicle Industry Is Not Telling Us

Evaluations of autonomous car companies as well as private investment in these companies are booming as billions of dollars are being channeled into the commercialization of autonomous car technology.

The Changing Face of the Cyber-Criminal Underground Playground

The underground has long been providing a haven for the malicious activities of cyber threat actors. By creating a greenhouse for the obtaining of tools and affiliates for a cyber-attack, the underground platforms have practically become the.

The Emerging Threat of Amateur Hackers

How dangerous is a bored high school student armed with a keyboard and an attraction to hacking? Well, it depends. Generally speaking, the run of the mill high school student probably has all he/she needs in order to carry out a simple.

What Would a Collaborative Hackers' Discussion Look Like?

Cyber-threat actors may plot against their targets by using secure, instant-messaging platforms and anonymous deep and dark web forums. By focusing on hacking-oriented forums and channels, actors can find  affiliates to help them successfully.

Updated And Upgraded: Underground's Crypto-Currency Silent Miners

Blockchain has recently caught a major piece of the world's financial system, and therefore inspired curiosity among fraudsters who look for new ways to gain profits. Now a popular investment, crypto-currency mining requires suitable hardware and.

Pentester Academy: Sixgill - Dark Web Cyber Intelligence

The dark web remains an extremely suspicious entity. Many less-technical users are completely unaware of this obscure sector of the internet. The dark web is a small part of what is known as the “deep web,” which is not indexed by search engines.

How The Dark Web Provides Cybercriminals With Trojan FAQ

Various cyber-incidents from the last couple of years have proved that the prophecy was correct: cyber-threats such as malware and ransomware of many kinds have become one of the most prevalent risks to businesses worldwide. Given this dramatic.

CVE Publishing - a Double-Edged Sword?

CVE (Common Vulnerabilities and Exposures) is a list of publicly known cybersecurity vulnerabilities and exposures. Its purpose is to facilitate the sharing of data and to alert users of required actions to mitigate potential threats in the cyber.

The Dark Web as an Active Stage for Botnet Commerce

Cyber threat actors use darknet forums to find and participate in "botnet opportunities" which may be both for hacking purposes or for investments in cryptocurrency silent mining. The Dark Web has grown to be an active stage for botnet discussion.

Don’t miss out on the latest

Get notified on Industry updates.
we promise not to spam