Illicit Telegram Groups: A New Dark Web Frontier?

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Illicit Telegram Groups: A New Dark Web Frontier?" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

The shady underworld of the dark web provides cybercriminals with an outlet to trade stolen information, tools, or malware, hold victims of cyber attacks to ransom, and discuss their targets and tactics. But the dark web forums that normally host illicit marketplaces and discussions are starting to lose their allure. Find out why the messaging […]

The Threat Intelligence Lifecycle: A Definitive Guide for 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "The Threat Intelligence Lifecycle: A Definitive Guide for 2023." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Building an effective threat intelligence program that disseminates actionable data that results in real-world risk reduction has never been more critical than in 2023. Threats to enterprise organizations ranging from geopolitical risk to sophisticated ransomware groups continue to proliferate while many security teams struggle to integrate dozens of tools together and stay on top of […]

Threat Intelligence in 2023: The Definitive Guide

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Intelligence in 2023: The Definitive Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Threat Intelligence provides organizations with timely, relevant information about threats to their business. Threat intelligence can come in many different forms and includes four primary layers, strategic threat intelligence, tactical threat intelligence, operational threat intelligence, and technical threat intelligence. Organizations with mature threat intelligence functions in place are able to effectively collect intelligence from hundreds […]

OSINT in Cybersecurity: Effectively Leveraging Open-Source Intelligence to Drive Enterprise Security Value in 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "OSINT in Cybersecurity: Effectively Leveraging Open Source Intelligence to Drive Enterprise Security Value." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

OSINT is a critical aspect of a competent cybersecurity program. Once an organization has the basics in place such as EDR, multi-factor authentication, network monitoring, and robust firewall rules, conducting effective open-source intelligence represents a significant opportunity for organizations to improve their cyber readiness. Cybersecurity OSINT enables companies to: What is Open Source Intelligence (OSINT)? […]

8 Passive OSINT Methods for Profiling Cybercriminals on the Dark Web

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "8 Passive OSINT Methods for Profiling Cybercriminals on the Dark Web" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Cybercrime is ever present in the increasingly digital landscape. Experts say that almost six ransomware attacks will occur every minute and back in November, 2021, our data science team reported a 280% increase in ransomware groups within the last year. But that’s only ransomware, cybercrime in general has also been increasing at a rapid pace, […]

Quick Report: Credit Cards Sold on the Dark Web in 2021

Credit Cards Sold on the Dark Web in 2021

The dark web is home to a vast amount of illicit markets and shops. Although there’s a variety of goods to be purchased on the dark web, one of the most sold resources by volume on the dark web, if not the most sold commodity, is stolen credit cards. Just last week, the largest carding […]

What is Data Leakage? How Do You Prevent It?

What is Data Leakage

During 2020, on average every person created at least 1.7 MBs of data per second and around 44 zettabytes of data in terms of the complete digital world. Today, the amount of data we create, distribute, analyze and sell has been increasing at an incredibly fast rate. Due to this increase of potentially sensitive data, […]

ToRReZ Market Shutting Down

ToRReZ Market Shutting Down

Two months after White House Market’s retirement, comes another surprise; ToRReZ, currently the second largest market by the total number of listings, has announced they will be shutting down. After close to two years of operation, on December 17th, 2021, purchasing will be officially disabled as well as a few other essential market functions. ToRReZ […]

5 Dark Web Questions Security Professionals Need Answered

datavore darkweb questions

We recently participated in Datavore conference where we reflected on our 9 years of experience in collecting intelligence on the dark web and monitoring malicious actors. Over the years, the tools, strategies and targets have changed considerably, and this walk down memory lane was an opportunity to gather our insights in how and why we […]

Which Darknet Market Has Replaced DarkMarket?

Updated: November 26th, 2021 As the article below is a bit out of date, here’s a breakdown of most of the large changes in the dark web marketplace scene: Empire Market exit scammed in August 2020 DarkMarket was sized in January 2021 Yellow Brick exited a few days after DarkMarket BigBlue was seized by Interpol in […]