Congratulations to Our Award-Winning CMO, Meira Primes!

Congratulations to Our Award-Winning CMO, Meira Primes!

Laurie Ben-Haim | 04 Nov 2021
On behalf of all of us at Cybersixgill, I would like to congratulate our Chief Marketing Officer, Meira Primes, on being recognized for her professional excellence by the 2021 Women in Business and the Professions World Awards. Meira has been announced as a Gold Globee winner, with the title of Top Woman of the Year […]
Read More >
How an MSSP Discovered a Compromised RDP Sold in a Dark Web Access Market

How an MSSP Discovered a Compromised RDP Sold in a Dark Web Access Market

Dov Lerner | 26 Oct 2021
This past June, CyberProof, an MSSP using Cybersixgill’s Investigative Portal, was approached by a client who had been targeted by a ransomware attack. Noa Raz, CyberProof’s Senior CTI analyst, understood that the ransomware group behind the attack had exploited compromised RDP connections as a means for establishing initial network access. This is in fact a […]
Read More >
For Business or for Banter: Who Roams the Dark Web? (and Why?)

For Business or for Banter: Who Roams the Dark Web? (and Why?)

Dov Lerner | 04 Oct 2021
We traced the digital footprints left by underground threat actors and made an interesting discovery: a correlation between why an actor uses a forum and how often the actor posts. What does this mean, and how can this intel help intelligence analysts in their investigations?
Read More >
Inside the Criminal Mind of the Future

Inside the Criminal Mind of the Future

Gilad Levy | 04 Oct 2021
Cybersecurity and information technology leaders discuss various aspects of the future of cybercrime and how to prevent or defend against it. Here’s what you need to know.
Read More >
How to Implement an Effective Threat Intelligence Program

How to Implement an Effective Threat Intelligence Program

Gilad Levy | 30 Sep 2021
Discover 5 key recommendations on how to implement an effective threat intelligence program - brought to you by some of the top dogs of cybersecurity.
Read More >
Maltego Users Can Now Access Cybersixgill’s Threat Intel from the Dark Web

Maltego Users Can Now Access Cybersixgill’s Threat Intel from the Dark Web

Ron Shamir | 22 Sep 2021
Maltego users can easily bolster their cyber threat investigations using Cybersixgill’s unmatched collection of intelligence from the deep and dark web.
Read More >
Underground Financial Fraud H1-2021

Underground Financial Fraud H1-2021

Edan Cohen | 13 Sep 2021
In the cybercriminal underground, data is money. For fraudsters, financial account data - traded as dumps or CVVs - is akin to striking oil. Just how profitable has 2021 been for the world's 3rd largest economy in the first 6 months of 2021?
Read More >
Dark Web Scraping

Dark Web Scraping

Dov Lerner | 02 Sep 2021
What is scraping, why is it so common among threat actors, and how can it jeopardize individuals’ privacy? Check out this post for the details you need.
Read More >
ToxicEye Shows Messaging Apps Can Be a Gateway to Cyberattacks

ToxicEye Shows Messaging Apps Can Be a Gateway to Cyberattacks

Michael Angelo Zummo | 09 Aug 2021
A Remote Access Trojan (RAT) dubbed ‘ToxicEye’ continues to maintain wide popularity in the underground three years after its initial release. This malware, used to infect devices via the Telegram messaging app, provides threat actors complete control over a victim’s device.
Read More >
Beyond the Buzzwords: Actionable Insights

Beyond the Buzzwords: Actionable Insights

Gilad Levy | 05 Aug 2021
In the previous posts we’ve explored the TI buzzwords “real-time” and “AI”.  We’ve ventured beyond the hype and learned how to understand whether or not a certain solution is suitable for you. Our buzzword this week is “actionable insights” – a term that has been beaten by tech marketers harder than a birthday piñata. We’ll take a deeper look […]
Read More >