Cyber threats and Dark Web trends from the experts at Sixgill

Chinese Threat Actors’ Dark Web Activities on Telegram

Beyond Chinese dark, deep and open web forums and blogs, and like popularinstant messaging apps such as WeChat and QQ, Telegram is an unlikely platformfor Chinese threat actors in which to operate considering it is completely censoredin China..

23 million stolen credit cards for sale on the dark web in the first half of 2019

American credit and debit card data is disproportionately found in illicit markets in which cyber criminals buy and sell them. 

We recently examined underground markets on the dark web for stolen credit card information and found over 23 million.


China has developed distinct software, unparalleled with the west. The best known example is Wechat, owned by Tencent. Wechat boasts over a billion users – one of the most popular apps in the world. While Wechat services are plenty – ranging from.

[Guest Blog] SixGill: Your Eyes On The Deep And Dark Web

Expert Insights met SixGill’s Barry Spielman to talk about how their platform is helping businesses to identify threats on the Deep and Dark Web by looking at it ‘like a social network.

The Challenge Behind Cyber Intelligence

Intelligence has many different faces. The simplest way to describe intelligence might be - information discovery for a certain purpose. Now, there are lots of types of information, thousands of ways of discovering it, and clearly numerous.

What the Autonomous Vehicle Industry Is Not Telling Us

Evaluations of autonomous car companies as well as private investment in these companies are booming as billions of dollars are being channeled into the commercialization of autonomous car technology.

The Changing Face of the Cyber-Criminal Underground Playground

The underground has long been providing a haven for the malicious activities of cyber threat actors. By creating a greenhouse for the obtaining of tools and affiliates for a cyber-attack, the underground platforms have practically become the.

The Emerging Threat of Amateur Hackers

How dangerous is a bored high school student armed with a keyboard and an attraction to hacking? Well, it depends. Generally speaking, the run of the mill high school student probably has all he/she needs in order to carry out a simple.

What Would a Collaborative Hackers' Discussion Look Like?

Cyber-threat actors may plot against their targets by using secure, instant-messaging platforms and anonymous deep and dark web forums. By focusing on hacking-oriented forums and channels, actors can find  affiliates to help them successfully.

Updated And Upgraded: Underground's Crypto-Currency Silent Miners

Blockchain has recently caught a major piece of the world's financial system, and therefore inspired curiosity among fraudsters who look for new ways to gain profits. Now a popular investment, crypto-currency mining requires suitable hardware and.

Don’t miss out on the latest

Get notified on Industry updates.
we promise not to spam