Tour of the Underground

Watch as Cyber Threat Intelligence Analyst Michael-Angelo Zummo shows you how to access the dark web and gives you a tour of the underground.

Watch Now

Extracting intelligence from the dark web

The dark web is a portion of the internet focused on privacy and anonymity, making it an ideal location for cybercriminals to share tools and information and offer their services for sale. This also makes dark web threat intelligence invaluable for companies as monitoring information posted on the dark web provides an uncensored view into the current cybercrime landscape and trends in cyberattacks.

Finding deep and dark web sources is no easy feat. The required knowledge of the exact URL is needed to access as these sources are not indexed.

From credit cards, data dumps, compromised endpoints, malicious programs, to the sale of narcotics, a whole lot of data is posted to these underground sources every minute of the day.

Watch as Cyber Threat Intelligence Analyst Michael-Angelo Zummo shows you how to access the dark web and gives you a tour of the underground.

Tour of the Underground Webinar thumbnail

What you'll learn

How to access the dark web

Types of underground sources

Extracting intel: manual vs paid intelligence

Recommendations to get ahead of threats and ways to protect yourself

Meet our speaker

Michael-Angelo Zummo

Michael-Angelo Zummo

Global Director, CTI Analysts

Michael-Angelo Zummo is the North America Threat Intelligence Manager for Cybersisxgill. Michael is an experienced cybercrime, cyber threat and investigative analyst. Previously, he was a cryptologic linquist for the NSA and a crime analyst in Pinellas Florida. Michael was a military academic advisor at SNHU, and has a Master’s Degree in cybercrime investigations and cybersecurity from Boston University.

View on demand

Discover how Cybersixgill’s products can support your business

Contact our experts to discover which solutions are the best fit for your company

Book a demo

Recommended resources

Report

Refund fraud on the dark web

This report examines underground discourse of “refunding” TTPs, providing an overview of threat actors' most common refunding methods.

Read now
Ebook

Beyond the Headllines

You’ve read the headlines, now get the REAL story. Stay ahead with monthly analysis of the top cyber security stories, latest CVEs, and deep and dark web mentions.

Read now
Ebook

Threat Hunting for Effective Risk Management

Protect Critical Assets and Minimize Risk with Proactive, Contextual Threat Intelligence

Read now