Sixgill’s Product Manager, Benjamin Preminger is interviewed by Paige Avezedo of BrightTalk @Summits at the Cybertech show in Tel Aviv, January 29, 2020.
Mobile Banking Malware
As people are constantly depending on their cell phones, cybercriminals have also focused their efforts and mobile banking malware has increasingly become a threat. In this webinar, Edan Cohen will discuss the two main types of mobile banking malware, mobile banking trojans and rogue banking applications, and also talk about how their capabilities can extend far beyond just stealing your banking credentials.
Sniffing in the Dark: Credit Card Sniffers on the Dark Web
Credit card sniffers are malicious scripts that are injected onto payment pages of e-commerce sites and scrape customer payment information, including credit card data. They have been identified as the highest-impact threat to the retail sector, accounting for 88 significant breaches in 2018, including the Magecart attack against British Airways. In this webinar, Dov discusses discourse on the dark web surrounding credit card sniffers, and what this teaches us about the broader cybercrime enterprise.
OPISIS and the Modern Age of Cyber Warfare
The fight against ISIS – the Islamic State – may have been decided in Syria, but in cyberspace it rages on. As ISIS fighters from around the world rallied around their infamous black banner, Anonymous hacktivists answered the call to counter ISIS online. The webinar traces how ISIS used online networks to grow their influence, how ISIS has taken measures to enforce strong cybersecurity measures among its members and how hacktivists battled ISIS in return.
How to Solve Your Vulnerability Challenges 100x Faster
Organisations have too much information in their hands, and not enough contextual intelligence to act upon. Omer will explain how machine learning, automation and valuable information from the dark and deep web can finally solve this acute problem from a new angle.
EM360 Podcast – Sixgill: Automated Protection Against Common Vulnerabilities and Exposures
Attacks have become part and parcel of an organisation’s lifespan. However, in most cases, this is the result of the attacker being able to exploit a weakness in the organisation. Thus, organisations must do what they can to understand their vulnerabilities and their impact. But understanding and reporting common vulnerabilities and exposures (CVEs) are rigorous tasks. Therefore, companies may benefit from using tools to increase automation and reduce manual procedures. In this podcast, freelance IT industry analyst Bob Tarzey speaks with Benjamin Preminger, Senior Cyber Threat Intelligence Specialist at Sixgill.
Latest Hacking News Podcast #301: Interview With Gilad Israeli, Cyber Threat Intelligence Specialist at Sixgill
An interview with Gilad Israeli, a Cyber Threat Intelligence Specialist at Sixgill, a leading Cyber Threat Intelligence company.
Compromised Credentials: The Cyber Underbelly of Global Corporations
In late 2018 we saw the release of a massive amount of leaked credentials “dumps”. These expertly-curated collections highlight the risk posed by credentials leaked from large organizations. Join this webinar to understand how even most novice threat actors have the access and ability to exploit billions of sensitive corporate credentials, and how this threat affects your organization.
Latest Hacking News Podcast #256: Interview with Gilad Israeli of Sixgill – Compromised Chinese Rail Control System on Dark Web
Gilad Israeli, Cyber Threat Intelligence Specialist at Sixgill, talks to us about the discovery of an experienced threat actor selling access to a compromised Chinese rail control system on the dark web.
Off the Shelf Hacking Products
Cyber threat actors find a seemingly limitless supply of hacking tools and products in deep and dark web markets and forums. How far can an attacker go with a ready-made hacking tool that was bought on the dark web? Where would the attacker be from? And what are the most popular off-shelf hacking product these days?
The Global Cybercrime Industry – A Holistic View
The cybercriminal economy is based on a global illicit industry that, although unregulated, has well defined regions, suppliers, distributors, consumers, innovators, and end-users.
Join us for a qualitative view of cybercriminal hubs around the world – differentiating cultural and environmental factors, motivations, and what place each occupies in the cybercrime supply chain
How Cyber Criminals Stay Anonymous
Cybercriminals always strive to stay ahead of the curve. In this webinar, Alex Karlinsky will shed some light on the latest techniques they employ to stay under the radar of cyber security firms and law enforcement agencies.
Your Identity on the Dark Web: How Much is it Worth to Criminals?
Join us to learn the worth of your personal information on the dark web, how it is being utilized and how you can avoid becoming a victim. The headlines are filled with stories of millions of people falling victim to identity theft; and still, online fraud and related crime are on the rise, affecting more lives and costing individuals and businesses more money year after year.
What pieces of your personal information are most valuable in the underground and how is the data leveraged for financial gain? What can you do to protect yourself? The answers to these questions may surprise you.
Fortnite and the Dark Web: How an illicit industry developed around this game
Gaming and criminality have gone hand in hand for centuries. From cheating in games of chance, through laundering money in cash-rich casinos, to grey market shark-lending, the gaming industry has historically been a hotbed of criminal activity.
It is no surprise then that digital gaming, an industry that grossed over $100 billion in 2017, has also attracted the criminal underclass.
Crypto-Wallet Cyber-Attack Alert: Hackers Are Coming
How could a smart cyber-threat intelligence prevent the hacking of a web-based crypto wallet that ended in a massive robbery of millions of dollars? Sixgill Senior Intelligence Anlayst Gilad Israeli looks at asset-based intelligence and its capability to lead to a cyber-attack prevention. As an example, Gilad will discuss how Sixgill exposed a cyber-attack prior to its execution and proved the capability of providing actionable intelligence.
Data Trading in the Darknet: What Types of Information are being Sold, and Why
Cybercriminals are constantly on the prowl, and personal and corporate data is their favorite catch. Confidential information is being traded in darknet underground markets at any moment, even years after being compromised. Learn about the different ways in which the data is stolen, how cyber crooks monetize it, and steps you can take to be better protected.
Sixgill Webinar at MIS/TI ESummit on Threat Intelligence – On Demand
Keeping up with cyber threats is a continual and time-intensive process. To allow the organization to operate with as little friction as possible, security, operations, and IT teams need to understand what data and systems they need to protect, who might be attempting unauthorized access, how adversaries might be approaching an attack, what tactics and techniques might be employed, and when (or if) that attack might hit. It’s a big problem, to say the least. Cyber threat intelligence helps organizations gain a grasp on their threat landscape and respond to emerging threats more quickly and effectively. But threat intelligence is only useful if it’s real intelligence and not just data. True threat intelligence isn’t a tool, an RSS feed, or even a bunch of correlated data. Threat intelligence is a product—a deliverable—which helps the entire organization understand the relevance of data found, the likelihood of an attack (based on the intelligence), and allows the security and/or ops team to take action.
Hear Sixgill’s presentation (On-Demand) at MISTI’s August 30, 2018 eSummit on Threat Intelligence and learn how automating the monitoring, collection and analysis of information from the deep and dark web and receiving prioritized alerts and customized actionable intelligence, can help organizations see the big picture of the threat landscape and obtain the necessary situational awareness to connect the dots to help prevent potential attacks.
Register for free, go to the Directory, Session Hall and Click on the second presentation: Demystifying the Dark Web.
Webinar – Demystifying the Dark Web: Why Threat Intel from Anonymous Networks is Critical
Threat intelligence is a critical factor in defending increasingly complex environments from sophisticated attacks. Join Sixgill and Forrester guest speaker Josh Zelonis for a fireside chat where we’ll explore how attackers are leveraging the deep and dark web, and how your organization can benefit from this type of intelligence.
Future Tech Podcast: Barry Spielman – Staying Safe on the Dark Web
In today’s world, cybersecurity’s at the top of everyone’s mind. But the DarkWeb seems beneath everyone’s attention. Why should most companies care about the DarkWeb when they’re doing business normally and legitimately, “above-ground,” so to speak? “Why do they care?” asks host Richard Jacobs.