Threat Intelligence Blog

[Guest Blog] Cybersixgill: Your Eyes On The Deep And Dark Web

[Guest Blog] Cybersixgill: Your Eyes On The Deep And Dark Web

Barry Spielman | 18 Apr 2019
Joel Witts of Expert Insights discusses the Cybersixgill platform and how we help business identity cyber threats in real-time.
Read More >
The Challenge Behind Cyber Intelligence

The Challenge Behind Cyber Intelligence

Gilad Israeli | 18 Mar 2019
How can we use cyber intelligence to develop solutions to mitigate cyber-attacks that will damage our privacy, money, health, and security?
Read More >
What the Autonomous Vehicle Industry Is Not Telling Us

What the Autonomous Vehicle Industry Is Not Telling Us

Noam Kehati | 23 Jan 2019
The threat of data breaches from autonomous cars and vehicles systems is on the rise. Here's what's at stake for the autonomous vehicle industry.
Read More >
The Changing Face of the Cyber-Criminal Underground Playground

The Changing Face of the Cyber-Criminal Underground Playground

Gilad Israeli | 18 Dec 2018
Governments around the world are taking the fight to Dark Web cybercriminals. What intelligence tools are they going to need to be victorious?
Read More >
The Emerging Threat of Amateur Hackers

The Emerging Threat of Amateur Hackers

Gilad Israeli | 20 Sep 2018
How dangerous is a bored high school student armed with a keyboard and an attraction to hacking? Generally speaking, the run of the mill high school student probably has all he/she needs in order to c
Read More >
What Would a Collaborative Hackers’ Discussion Look Like?

What Would a Collaborative Hackers’ Discussion Look Like?

Gilad Israeli | 31 Jul 2018
Here's why we believe the solution to prevent major-cyber attacks starts with eavesdropping on Dark Web conversations.
Read More >
Updated And Upgraded: Underground’s Crypto-Currency Silent Miners

Updated And Upgraded: Underground’s Crypto-Currency Silent Miners

Gilad Israeli | 02 Jul 2018
In this article, we cover the growing demand from amateur hackers for malware that enables cryptocurrency mining using infected computers.
Read More >
Pentester Academy: Cybersixgill – Dark Web Cyber Intelligence

Pentester Academy: Cybersixgill – Dark Web Cyber Intelligence

Pentester Academy | 13 Jun 2018
The Dark Web has grown to be a popular platform for hackers to share knowledge and provide potential attackers with key 'how-to' information.
Read More >
How The Dark Web Provides Cybercriminals With Trojan FAQ

How The Dark Web Provides Cybercriminals With Trojan FAQ

Gilad Israeli | 12 Jun 2018
Here's how Dark Web forums are becoming a prominent source for cyber-threat knowledge sharing, including providing cybercriminals with Trojan FAQ.
Read More >
CVE Publishing – a Double-Edged Sword?

CVE Publishing – a Double-Edged Sword?

omer Carmi | 14 May 2018
While CVE publishing is crucial in the cyber world, it becomes a liability when cyber threat-actors find ways to exploit published vulnerabilities.
Read More >