Gaming the Game: Cybersixgill Report Shows eSports Fraud Spiking

Gaming the Game: Cybersixgill Report Shows eSports Fraud Spiking

Michael Angelo Zummo | 09 Jun 2020
Esports fraud, hacks, and exploits are widely available on dark web marketplaces. Cybersixgill investigates the spike in underground activity surrounding the gaming industry.
Read More >
Dark web drug supply surges nearly 500% during COVID-19 pandemic

Dark web drug supply surges nearly 500% during COVID-19 pandemic

Meira Primes | 27 May 2020
We've seen dramatic growth - nearly 500% - of underground illicit drug supply since the coronavirus pandemic. Read the blog post.
Read More >
Where there’s smoke: A look at CARES Act fraud on the dark web

Where there’s smoke: A look at CARES Act fraud on the dark web

Meira Primes | 12 May 2020
Following the $2 trillion relief CARE package, it’s no surprise dark web threat activities have spiked. Here are some of the most alarming trends.
Read More >
5 ALARMING WAYS THE ACCOUNT TAKEOVER ECOSYSTEM IS EVOLVING

5 ALARMING WAYS THE ACCOUNT TAKEOVER ECOSYSTEM IS EVOLVING

Meira Primes | 30 Apr 2020
The reality of account takeover (ATO) attacks is becoming more serious. Here are five particularly alarming ATO trends that we've identified.
Read More >
Chinese Threat Actors’ Dark Web Activities on Telegram

Chinese Threat Actors’ Dark Web Activities on Telegram

Ori Rubinstein | 17 Sep 2019
Instant messaging in China is more than WeChat and QQ. Here's here's why Telegram is popular among Chinese threat actors operating on the Dark Web.
Read More >
CHINA’S UNIQUE PLATFORMS FOR CYBER THREAT ACTORS: WECHAT AND QQ

CHINA’S UNIQUE PLATFORMS FOR CYBER THREAT ACTORS: WECHAT AND QQ

Ori Rubinstein | 16 Jul 2019
Many Chinese cyber threat actors are using WeChat and QQ as the main platform for their activities. Here's what you need to know.
Read More >
What the Autonomous Vehicle Industry Is Not Telling Us

What the Autonomous Vehicle Industry Is Not Telling Us

Noam Kehati | 23 Jan 2019
The threat of data breaches from autonomous cars and vehicles systems is on the rise. Here's what's at stake for the autonomous vehicle industry.
Read More >
The Emerging Threat of Amateur Hackers

The Emerging Threat of Amateur Hackers

Gilad Israeli | 20 Sep 2018
How dangerous is a bored high school student armed with a keyboard and an attraction to hacking? Generally speaking, the run of the mill high school student probably has all he/she needs in order to c
Read More >
What Would a Collaborative Hackers’ Discussion Look Like?

What Would a Collaborative Hackers’ Discussion Look Like?

Gilad Israeli | 31 Jul 2018
Here's why we believe the solution to prevent major-cyber attacks starts with eavesdropping on Dark Web conversations.
Read More >
Updated And Upgraded: Underground’s Crypto-Currency Silent Miners

Updated And Upgraded: Underground’s Crypto-Currency Silent Miners

Gilad Israeli | 02 Jul 2018
In this article, we cover the growing demand from amateur hackers for malware that enables cryptocurrency mining using infected computers.
Read More >