About Barry Spielman

This author has not yet filled in any details.
So far Barry Spielman has created 23 blog entries.

China’s Unique Platforms for Cyber Threat Actors: Wechat and QQ

China has developed distinct software, unparalleled with the west. Wechat boasts over a billion users – one of the most popular apps in the world. Even though apps such as this are being monitored and censored by the government, many Chinese speaking threat actors are using them as their main platform for their activities. While China routinely blocks malicious content, the scope is proving too great to handle. This may also be why most Chinese threat actors allow themselves to operate in the open web rather than the dark web.


The Emerging Threat of Amateur Hackers

How dangerous is a bored high school student armed with a keyboard and an attraction to hacking? Generally speaking, the run of the mill high school student probably has all he/she needs in order to carry out a simple cyber-attack on an unsecure server. The only question is: which target will they choose?


CVE Publishing – a Double-Edged Sword?

Although the practice of alerting the public with new CVEs is a crucial component in contemporary cyber-security strategy, Sixgill has identified a common practice in the Dark Web underground which indicates that publishing CVEs could turn out to be a double-edged sword.


The Dark Web as an Active Stage for Botnet Commerce

Cyber threat actors use darknet forums to find and participate in "botnet opportunities" which may be both for hacking purposes or for investments in cryptocurrency silent mining. The Dark Web has grown to be an active stage for botnet discussion and commerce, rendering botnet-based cyber-attacks more likely.


Will GDPR Aid Cyber Criminals?

Paypal and LinkedIn letting me know they updated their ToS to be GDPR compliant. Although these were legit, it is a great opportinity for cybercriminals to ride the wave and send fake letters that wil lead a victim to a phishing site or malware infection point.


Emerging Trends in Dark Net Markets

Every now and then, there is a high profile closure of a Dark Net market. The most famous such closure, of course, was of Silk Road. In 2017, two of the largest Dark Net markets, Alpha Bay and Hansa, were also closed down. But as history has shown, when one market closes, another opens. Vendors and customers will find their way to alternative sources as other markets will become popular and new ones will emerge.


Dark Web Intelligence with Sharp Teeth

We are reprinting here the blog from Beyond Search - News and information from ArnoldIT.com about search and content processing - by Stephen Arnold, the author of the book the Dark Web Notebook. http://arnoldit.com/wordpress/2017/12/14/sixgill-dark-web-intelligence-with-sharp-teeth/  SIXGILL: Dark Web Intelligence with Sharp Teeth December 14, 2017 “Sixgill” refers to the breathing apparatus of a shark. Deep. Silent. [...]


Intelligence Collection in the Dark Web: How Old school Intelligence Gathering is Different than Dark Web Monitoring, and How is it the Same

Perhaps the best way to deal with the dark web is to treat it as if it’s a cyber criminal intelligence source, like an old school organized crime meeting place or a den of drug dealers that needs to be infiltrated. With proper intelligence gathering techniques you stand a good chance to detect and shut down the next attack before it happens, rather than react to it once it does.


Bringing back Balance to the Web: News Content, Twitter Trolls, and Dark Web Criminals Show the Web is out of Whack

While we have built technological mechanisms that allow for a completely free flow of information, to do so anonymously and freely, there hasn’t been a sufficient focus on how to balance that free flow of information with a counterweight. The answer is not censorship. Rather, it must lie in building an understanding of the processes at work, and how we can balance the flow of information on the web without stopping it all together.