Malicious activity of the Slovakian "Anonymous" group was found in the Deep Web message board ‘Hidden Answers’, where threat actors were looking to recruit accomplices for an operation targeting NATO and EU websites.
Every now and then, there is a high profile closure of a Dark Net market. The most famous such closure, of course, was of Silk Road. In 2017, two of the largest Dark Net markets, Alpha Bay and Hansa, were also closed down. But as history has shown, when one market closes, another opens. Vendors and customers will find their way to alternative sources as other markets will become popular and new ones will emerge.
We are reprinting here the blog from Beyond Search - News and information from ArnoldIT.com about search and content processing - by Stephen Arnold, the author of the book the Dark Web Notebook. http://arnoldit.com/wordpress/2017/12/14/sixgill-dark-web-intelligence-with-sharp-teeth/ SIXGILL: Dark Web Intelligence with Sharp Teeth December 14, 2017 “Sixgill” refers to the breathing apparatus of a shark. Deep. Silent. [...]
Distributed decentralized currencies like Bitcoin are held and maintained by the people, thus making them safer. But, are they really safer?
Similar to other verticals, the health care industry is vulnerable to cyberattacks that can cause tremendous damage, both to the medical organizations themselves and to their patients. Download new Sixgill Threat Report on the vulnerability of the Health Care Industry.
There is an inherent fear of the Dark Web, and with good reason. There are a lot of bad things going on: sale of drugs, weapons, stolen credit cards and identity theft and even worse. It is important to understand what the Dark Web is and how it works, what kind of threats exist and how you can protect your organization from them.
Intelligence Collection in the Dark Web: How Old school Intelligence Gathering is Different than Dark Web Monitoring, and How is it the Same
Perhaps the best way to deal with the dark web is to treat it as if it’s a cyber criminal intelligence source, like an old school organized crime meeting place or a den of drug dealers that needs to be infiltrated. With proper intelligence gathering techniques you stand a good chance to detect and shut down the next attack before it happens, rather than react to it once it does.
A wide spectrum of communities can be found on Telegram, a secure messaging application operating in the deep web. Over the past few years, Telegram has emerged as the jihadists' preferred application for communications.
Bringing back Balance to the Web: News Content, Twitter Trolls, and Dark Web Criminals Show the Web is out of Whack
While we have built technological mechanisms that allow for a completely free flow of information, to do so anonymously and freely, there hasn’t been a sufficient focus on how to balance that free flow of information with a counterweight. The answer is not censorship. Rather, it must lie in building an understanding of the processes at work, and how we can balance the flow of information on the web without stopping it all together.