Threat Intelligence Blog

Chinese Threat Actors’ Dark Web Activities on Telegram

Chinese Threat Actors’ Dark Web Activities on Telegram

Ori Rubinstein | 17 Sep 2019
Instant messaging in China is more than WeChat and QQ. Here's here's why Telegram is popular among Chinese threat actors operating on the Dark Web.
Read More >
23 million stolen credit cards for sale on the dark web in the first half of 2019

23 million stolen credit cards for sale on the dark web in the first half of 2019

Benjamin Preminger | 25 Jul 2019
We recently examined underground markets on the dark web for stolen credit card information in the first half of 2019. Here are our findings.
Read More >
CHINA’S UNIQUE PLATFORMS FOR CYBER THREAT ACTORS: WECHAT AND QQ

CHINA’S UNIQUE PLATFORMS FOR CYBER THREAT ACTORS: WECHAT AND QQ

Ori Rubinstein | 16 Jul 2019
Many Chinese cyber threat actors are using WeChat and QQ as the main platform for their activities. Here's what you need to know.
Read More >
[Guest Blog] Cybersixgill: Your Eyes On The Deep And Dark Web

[Guest Blog] Cybersixgill: Your Eyes On The Deep And Dark Web

Barry Spielman | 18 Apr 2019
Joel Witts of Expert Insights discusses the Cybersixgill platform and how we help business identity cyber threats in real-time.
Read More >
The Challenge Behind Cyber Intelligence

The Challenge Behind Cyber Intelligence

Gilad Israeli | 18 Mar 2019
How can we use cyber intelligence to develop solutions to mitigate cyber-attacks that will damage our privacy, money, health, and security?
Read More >
What the Autonomous Vehicle Industry Is Not Telling Us

What the Autonomous Vehicle Industry Is Not Telling Us

Noam Kehati | 23 Jan 2019
The threat of data breaches from autonomous cars and vehicles systems is on the rise. Here's what's at stake for the autonomous vehicle industry.
Read More >
The Changing Face of the Cyber-Criminal Underground Playground

The Changing Face of the Cyber-Criminal Underground Playground

Gilad Israeli | 18 Dec 2018
Governments around the world are taking the fight to Dark Web cybercriminals. What intelligence tools are they going to need to be victorious?
Read More >
The Emerging Threat of Amateur Hackers

The Emerging Threat of Amateur Hackers

Gilad Israeli | 20 Sep 2018
How dangerous is a bored high school student armed with a keyboard and an attraction to hacking? Generally speaking, the run of the mill high school student probably has all he/she needs in order to c
Read More >
What Would a Collaborative Hackers’ Discussion Look Like?

What Would a Collaborative Hackers’ Discussion Look Like?

Gilad Israeli | 31 Jul 2018
Here's why we believe the solution to prevent major-cyber attacks starts with eavesdropping on Dark Web conversations.
Read More >
Updated And Upgraded: Underground’s Crypto-Currency Silent Miners

Updated And Upgraded: Underground’s Crypto-Currency Silent Miners

Gilad Israeli | 02 Jul 2018
In this article, we cover the growing demand from amateur hackers for malware that enables cryptocurrency mining using infected computers.
Read More >