Cyber threats and Dark Web trends from the experts at Sixgill

23 million stolen credit cards for sale on the dark web in the first half of 2019

American credit and debit card data is disproportionately found in illicit markets in which cyber criminals buy and sell them. 

We recently examined underground markets on the dark web for stolen credit card information and found over 23 million.


China has developed distinct software, unparalleled with the west. The best known example is Wechat, owned by Tencent. Wechat boasts over a billion users – one of the most popular apps in the world. While Wechat services are plenty – ranging from.

[Guest Blog] SixGill: Your Eyes On The Deep And Dark Web

Expert Insights met SixGill’s Barry Spielman to talk about how their platform is helping businesses to identify threats on the Deep and Dark Web by looking at it ‘like a social network.

The Challenge Behind Cyber Intelligence

Intelligence has many different faces. The simplest way to describe intelligence might be - information discovery for a certain purpose. Now, there are lots of types of information, thousands of ways of discovering it, and clearly numerous.

What the Autonomous Vehicle Industry Is Not Telling Us

Evaluations of autonomous car companies as well as private investment in these companies are booming as billions of dollars are being channeled into the commercialization of autonomous car technology.

The Changing Face of the Cyber-Criminal Underground Playground

The underground has long been providing a haven for the malicious activities of cyber threat actors. By creating a greenhouse for the obtaining of tools and affiliates for a cyber-attack, the underground platforms have practically become the.

The Emerging Threat of Amateur Hackers

How dangerous is a bored high school student armed with a keyboard and an attraction to hacking? Well, it depends. Generally speaking, the run of the mill high school student probably has all he/she needs in order to carry out a simple.

What Would a Collaborative Hackers' Discussion Look Like?

Cyber-threat actors may plot against their targets by using secure, instant-messaging platforms and anonymous deep and dark web forums. By focusing on hacking-oriented forums and channels, actors can find  affiliates to help them successfully.

Updated And Upgraded: Underground's Crypto-Currency Silent Miners

Blockchain has recently caught a major piece of the world's financial system, and therefore inspired curiosity among fraudsters who look for new ways to gain profits. Now a popular investment, crypto-currency mining requires suitable hardware and.

Pentester Academy: Sixgill - Dark Web Cyber Intelligence

The dark web remains an extremely suspicious entity. Many less-technical users are completely unaware of this obscure sector of the internet. The dark web is a small part of what is known as the “deep web,” which is not indexed by search engines.

Don’t miss out on the latest

Get notified on Industry updates.
we promise not to spam