cyber threat intelligence

The Winners and Losers of the Empire Market Shutdown

How To Identify The Next Major Cyber Threats through Job Postings

How to Identify the Next Major Cyber Threats Through Job Postings A significant challenge for security teams is to extract intelligence from open-source information. Malicious actors routinely post advertisements like the one below. This actor is offering up a method, … Read More

dorking blog article

Dorking: Preventing Leaks From Hurting Your Firm

Dorking: Preventing Leaks From Hurting Your Firm While readily available, malware is far from being the only tool that malicious actors use to steal data and illegally access computer networks. Malicious actors indeed threaten firms’ security using far more mundane … Read More

Extracting Intelligence From Criminal Complaints

Extracting Intelligence From Criminal Complaints

Extracting Intelligence From Criminal Complaints On May 3rd, law enforcement agencies announced that they had seized the servers that hosted the Wall Street darknet illicit market. They also arrested the market’s administrators. A copy of criminal complaint is now published … Read More

online illicit markets

Online illicit markets

Online illicit markets The darknet provides a relatively anonymous environment in which to buy and sell illicit goods and services. Transactions take place in illicit markets that operate in a similar fashion to eBay and Amazon. The markets invite independent … Read More