Search Results for: Dark Web Blog Post Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone... Blog Post Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19... Blog Post Malware-As-A-Service On The Dark web?! February 19, 2020 Cybersecurity Researchers at Venafi recently warned about the backdoor malware techniques used by “Black Energy Gang” attackers to shut down... Blog Post DOJ & Europol Arrest 150 in Disruption of DarkNet Drug Operation November 24, 2021 International cybercrime sting operation leads to the seizure of weapons, drugs, and $31 million from DarkNet opioid traffickers. Operation Dark... Knowledge Center ParamSpider – Mining parameters from dark corners of Web Archives May 29, 2020 Have you ever wondered how to scrape all the parameters from domain and subdomains from the past without manually crawling... Knowledge Center Dark Web Surveillance Services July 30, 2019 In today’s threat surface there are multiple ways to know that your company has been hacked. Typically, this is done... Blog Post Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by... Blog Post The Evolution of Ransomware Operations: Latest Trends November 22, 2021 Ransomware is a common weapon of choice for cybercriminals. Depending on the group size and experience, they target small, medium,... Blog Post Notorious Ransomware Gang Crushed by FBI in International Operation December 13, 2021 REvil, a notorious Eastern-European cybersecurity gang that has been blamed for major attacks on global businesses, has recently been compromised... Blog Post Why is Password Reuse One of The Weakest Points in Cybersecurity? October 14, 2021 The use of weak and stolen passwords has consistently been highlighted as the most prevalent hacking technique cybercriminals use year... Blog Post Small Banks are a Step Behind Ransomware Groups, Seek Help from Congress December 1, 2021 Ransomware attacks on smaller, community banks in the US have ramped up in recent years, putting the financial data of... Blog Post Unsophisticated Nigerian Threat Actor Threatening to Ground the Airline Industry Through Commodity Malware October 7, 2021 For the past five years, a suspected unsophisticated threat actor has been wreaking havoc on the airline and other industries... Blog Post Ransomware Gangs Stoop To Cold-Calling Victims When They Restore From Backups Without Paying December 11, 2020 Stooping to further moral degradation, some ransomware gangs are now cold-calling victims in a bid to direct pressure on them.... Blog Post HolesWarm (Crypto-Miner) Malware Targeted Unpatched Windows and Linux Servers September 16, 2021 Researchers at a security firm named Tencent have recently revealed details about the botnet crypto-miner. For the record, the crypto-miner... Blog Post Moving Your Business to the Cloud? Cybercriminals are Hot on Your Heels October 13, 2021 Although cloud adoption has been an inevitable imperative for some time and a driving force in changing how businesses operate,...
Blog Post Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone...
Blog Post Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19...
Blog Post Malware-As-A-Service On The Dark web?! February 19, 2020 Cybersecurity Researchers at Venafi recently warned about the backdoor malware techniques used by “Black Energy Gang” attackers to shut down...
Blog Post DOJ & Europol Arrest 150 in Disruption of DarkNet Drug Operation November 24, 2021 International cybercrime sting operation leads to the seizure of weapons, drugs, and $31 million from DarkNet opioid traffickers. Operation Dark...
Knowledge Center ParamSpider – Mining parameters from dark corners of Web Archives May 29, 2020 Have you ever wondered how to scrape all the parameters from domain and subdomains from the past without manually crawling...
Knowledge Center Dark Web Surveillance Services July 30, 2019 In today’s threat surface there are multiple ways to know that your company has been hacked. Typically, this is done...
Blog Post Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by...
Blog Post The Evolution of Ransomware Operations: Latest Trends November 22, 2021 Ransomware is a common weapon of choice for cybercriminals. Depending on the group size and experience, they target small, medium,...
Blog Post Notorious Ransomware Gang Crushed by FBI in International Operation December 13, 2021 REvil, a notorious Eastern-European cybersecurity gang that has been blamed for major attacks on global businesses, has recently been compromised...
Blog Post Why is Password Reuse One of The Weakest Points in Cybersecurity? October 14, 2021 The use of weak and stolen passwords has consistently been highlighted as the most prevalent hacking technique cybercriminals use year...
Blog Post Small Banks are a Step Behind Ransomware Groups, Seek Help from Congress December 1, 2021 Ransomware attacks on smaller, community banks in the US have ramped up in recent years, putting the financial data of...
Blog Post Unsophisticated Nigerian Threat Actor Threatening to Ground the Airline Industry Through Commodity Malware October 7, 2021 For the past five years, a suspected unsophisticated threat actor has been wreaking havoc on the airline and other industries...
Blog Post Ransomware Gangs Stoop To Cold-Calling Victims When They Restore From Backups Without Paying December 11, 2020 Stooping to further moral degradation, some ransomware gangs are now cold-calling victims in a bid to direct pressure on them....
Blog Post HolesWarm (Crypto-Miner) Malware Targeted Unpatched Windows and Linux Servers September 16, 2021 Researchers at a security firm named Tencent have recently revealed details about the botnet crypto-miner. For the record, the crypto-miner...
Blog Post Moving Your Business to the Cloud? Cybercriminals are Hot on Your Heels October 13, 2021 Although cloud adoption has been an inevitable imperative for some time and a driving force in changing how businesses operate,...