Threat Intelligence Blog

Are Dark Web Crypto Exchanges Experiencing a Bank Run

Are Dark Web Crypto Exchanges Experiencing a Bank Run

Dov Lerner | 14 Jul 2022
Since it reached a peak of over $64,000 in November, 2021, the price of bitcoin has plummeted, at one point falling over 70%. Other cryptocurrencies, such as Ethereum and Monero, have dropped similar amounts, wiping out $1.8 trillion in total value. When a currency drops in value so precipitously, it often triggers an event known […]
Read More >
Dox of US Supreme Court Justices

Dox of US Supreme Court Justices

Dov Lerner | 13 Jul 2022
Doxing, which comes from the word “document,” is the act of publicly releasing a rival’s identity and personal details, and it is often used as a form of harassment and intimidation. While not all dark web sites permit doxing, there are certain ones that exist for this purpose. While doxing originated in the niche of […]
Read More >
PCI DSS and Risk-Based Cyber Threat Intelligence Part 2: Implementing New PCI DSS to Protect Payment Data

PCI DSS and Risk-Based Cyber Threat Intelligence Part 2: Implementing New PCI DSS to Protect Payment Data

Christopher Strand | 12 Jul 2022
As I previously shared in our blog, Cybersixgill recently became the first actively contributing cyber intelligence company to align with the Payment Card Industry Security Standards Council (PCI SSC). PCI SSC is a global forum comprised of payments industry leaders to develop and drive adoption of data security standards and resources for safe payments worldwide. […]
Read More >
A guide to APTs on the Deep and Dark Web

A guide to APTs on the Deep and Dark Web

Adi Bleih | 11 Jul 2022
The term advanced persistent threat (APT) refers to cyber criminals with sophisticated capabilities and strong motivations – whether political (state-sponsored), financial (cybercrime), or ideological (hacktivism) – for targeted attacks. APTs are generally groups, occasionally with international presence. In addition to deep knowledge of computers and networking, they may also have familiarity with esoteric hardware and […]
Read More >
Inside the Chinese Firewall

Inside the Chinese Firewall

Delilah Schwartz | 06 Jul 2022
How China-based hackers, working together, elude the censors  There’s strength in numbers, as China-based hackers know. Working communally helps them slip past the “Chinese Firewall” – the Chinese government’s censorship filter – and avoid surveillance.  Now that some are interacting on Russian underground sites, might Chinese cybercriminals teach their Russian counterparts new approaches, increasing the […]
Read More >
The Cyber Vulnerabilities You are Not Worried About

The Cyber Vulnerabilities You are Not Worried About

Michael-Angelo Zummo | 29 Jun 2022
INTRODUCTION Since the standard of Common Vulnerabilities and Exposures (CVE) was first introduced in 1999, almost 200,000 publicly known vulnerabilities have been recorded to date. While many of these vulnerabilities have since been patched (some were patched years, even decades ago), many organizations have not yet applied the available security updates and patches, leaving their […]
Read More >
You Think You Have Intelligence. But You Really Have Information

You Think You Have Intelligence. But You Really Have Information

Dani Woolf | 27 Jun 2022
Security teams often think that simply having a threat intelligence feed arms them with what they need to protect their organization. But the truth is, most companies receive a raw data feed from their threat intelligence vendors — which is really just information. There is a difference between information and intelligence, as discussed on a […]
Read More >
The Chinese-Russian Cybercrime Threat Intelligence Report

The Chinese-Russian Cybercrime Threat Intelligence Report

Naomi Yusupov | 15 Jun 2022
Are Chinese and Russian hackers joining forces to attack computer systems and networks in other countries? A newly formed Russian-Chinese ransomware-forum alliance – and the organizer’s call to action against the U.S. – has some cyber specialists alarmed about the threats such a collaboration might pose to the rest of the world. To discern the […]
Read More >
File Sharing Services on the Cybercriminal Underground

File Sharing Services on the Cybercriminal Underground

Adi Bleih | 09 Jun 2022
The digital workforce is transferring far more and far larger files among a more comprehensive network of computers at faster speeds than ever before. Managing, controlling, and securing the ad hoc data flow across systems, ecosystem partners, and customers grows more and more complex as enterprise organizations attempt to balance the dueling needs of ensuring […]
Read More >
How to Organize the Flood of Threat Intelligence Data to Make it More Actionable

How to Organize the Flood of Threat Intelligence Data to Make it More Actionable

Dani Woolf | 08 Jun 2022
On a recent episode of our podcast, Dr. Dark Web hosted by Chris Roberts, we had the opportunity to pick the brain of Cecil Pineda, the SVP/CISO at R1 RCM. Pineda is the co-founder of CISO XC, and works for dozens of CIOs, CISOs and CPOs of Fortune 100 companies, helping them maneuver through acquisitions […]
Read More >