BrightTalk Interview with Benjamin Preminger, Sixgill Product Manager, at Cybertech

Sixgill’s Product Manager, Benjamin Preminger is interviewed by Paige Avezedo of BrightTalk @Summits at the Cybertech show in Tel Aviv, January 29, 2020.

DOWNLOAD RESOURCE January 29, 2020

Mobile Banking Malware

As people are constantly depending on their cell phones, cybercriminals have also focused their efforts and mobile banking malware has increasingly become a threat. In this webinar, Edan Cohen will discuss the two main types of mobile banking malware, mobile banking trojans and rogue banking applications, and also talk about how their capabilities can extend far beyond just stealing your banking credentials.

DOWNLOAD RESOURCE January 27, 2020
sniffing in the dark webinar sixgill

Sniffing in the Dark: Credit Card Sniffers on the Dark Web

Credit card sniffers are malicious scripts that are injected onto payment pages of e-commerce sites and scrape customer payment information, including credit card data. They have been identified as the highest-impact threat to the retail sector, accounting for 88 significant breaches in 2018, including the Magecart attack against British Airways. In this webinar, Dov discusses discourse on the dark web surrounding credit card sniffers, and what this teaches us about the broader cybercrime enterprise.

DOWNLOAD RESOURCE December 10, 2019

OPISIS and the Modern Age of Cyber Warfare

The fight against ISIS – the Islamic State –  may have been decided in Syria, but in cyberspace it rages on. As ISIS fighters from around the world rallied around their infamous black banner, Anonymous hacktivists answered the call to counter ISIS online. The webinar traces how ISIS used online networks to grow their influence, how ISIS has taken measures to enforce strong cybersecurity measures among its members and how hacktivists battled ISIS in return.

DOWNLOAD RESOURCE November 4, 2019
webinar how to solve vulnerability challenge 100x faster

How to Solve Your Vulnerability Challenges 100x Faster

Organisations have too much information in their hands, and not enough contextual intelligence to act upon. Omer will explain how machine learning, automation and valuable information from the dark and deep web can finally solve this acute problem from a new angle.

podcast enterprise management 360 benji preminger bob tarzey

EM360 Podcast – Sixgill: Automated Protection Against Common Vulnerabilities and Exposures

Attacks have become part and parcel of an organisation’s lifespan. However, in most cases, this is the result of the attacker being able to exploit a weakness in the organisation. Thus, organisations must do what they can to understand their vulnerabilities and their impact. But understanding and reporting common vulnerabilities and exposures (CVEs) are rigorous tasks. Therefore, companies may benefit from using tools to increase automation and reduce manual procedures. In this podcast, freelance IT industry analyst Bob Tarzey speaks with Benjamin Preminger, Senior Cyber Threat Intelligence Specialist at Sixgill.

latest hacking news logo

Latest Hacking News Podcast #301: Interview With Gilad Israeli, Cyber Threat Intelligence Specialist at Sixgill

An interview with Gilad Israeli, a Cyber Threat Intelligence Specialist at Sixgill, a leading Cyber Threat Intelligence company.

webinar compromised credentials

Compromised Credentials: The Cyber Underbelly of Global Corporations

In late 2018 we saw the release of a massive amount of leaked credentials “dumps”. These expertly-curated collections highlight the risk posed by credentials leaked from large organizations. Join this webinar to understand how even most novice threat actors have the access and ability to exploit billions of sensitive corporate credentials, and how this threat affects your organization.

Hacking News logo

Latest Hacking News Podcast #256: Interview with Gilad Israeli of Sixgill – Compromised Chinese Rail Control System on Dark Web

Gilad Israeli, Cyber Threat Intelligence Specialist at Sixgill, talks to us about the discovery of an experienced threat actor selling access to a compromised Chinese rail control system on the dark web.

webinar off the shelf hacking products

Off the Shelf Hacking Products

Cyber threat actors find a seemingly limitless supply of hacking tools and products in deep and dark web markets and forums. How far can an attacker go with a ready-made hacking tool that was bought on the dark web? Where would the attacker be from? And what are the most popular off-shelf hacking product these days?

global cybercrim industry sixgill webinar

The Global Cybercrime Industry – A Holistic View

The cybercriminal economy is based on a global illicit industry that, although unregulated, has well defined regions, suppliers, distributors, consumers, innovators, and end-users.

Join us for a qualitative view of cybercriminal hubs around the world – differentiating cultural and environmental factors, motivations, and what place each occupies in the cybercrime supply chain

DOWNLOAD RESOURCE February 20, 2019
Hacking News logo

Latest Hacking News Podcast #205: Interview with Noam Kehati of Sixgill

Noam Kehati, Cyber Intelligence Analyst at Sixgill, talks about interesting conversations she’s had with cybercriminals on the dark web as well as Sixgill’s research into dark web criminal activity.

Today’s Agenda is as follows:

  • About Sixgill
  • What is the dark web?
  • Mapping the dark web as a social network.
  • Conversations with cybercriminals.
  • How individuals and enterprises can protect their information.
DOWNLOAD RESOURCE January 21, 2019
webinar how cybercriminals stay anonymous

How Cyber Criminals Stay Anonymous

Cybercriminals always strive to stay ahead of the curve. In this webinar, Alex Karlinsky will shed some light on the latest techniques they employ to stay under the radar of cyber security firms and law enforcement agencies.

DOWNLOAD RESOURCE January 19, 2019
sixgill webinar your identity on the dark web how much is it worth to criminals

Your Identity on the Dark Web: How Much is it Worth to Criminals?

Join us to learn the worth of your personal information on the dark web, how it is being utilized and how you can avoid becoming a victim.  The headlines are filled with stories of millions of people falling victim to identity theft; and still, online fraud and related crime are on the rise, affecting more lives and costing individuals and businesses more money year after year.

What pieces of your personal information are most valuable in the underground and how is the data leveraged for financial gain? What can you do to protect yourself? The answers to these questions may surprise you.

DOWNLOAD RESOURCE December 19, 2018
sixgill webinar fortnite dark web illicit industry developed around immensely popular game

Fortnite and the Dark Web: How an illicit industry developed around this game

Gaming and criminality have gone hand in hand for centuries. From cheating in games of chance, through laundering money in cash-rich casinos, to grey market shark-lending, the gaming industry has historically been a hotbed of criminal activity.

It is no surprise then that digital gaming, an industry that grossed over $100 billion in 2017, has also attracted the criminal underclass.

DOWNLOAD RESOURCE November 7, 2018
sixgill webinar crypto wallet cyber attack alert hackers are coming

Crypto-Wallet Cyber-Attack Alert: Hackers Are Coming

How could a smart cyber-threat intelligence prevent the hacking of a web-based crypto wallet that ended in a massive robbery of millions of dollars? Sixgill Senior Intelligence Anlayst Gilad Israeli looks at asset-based intelligence and its capability to lead to a cyber-attack prevention. As an example, Gilad will discuss how Sixgill exposed a cyber-attack prior to its execution and proved the capability of providing actionable intelligence.

sixgill webinar data trading on the darknet

Data Trading in the Darknet: What Types of Information are being Sold, and Why

Cybercriminals are constantly on the prowl, and personal and corporate data is their favorite catch. Confidential information is being traded in darknet underground markets at any moment, even years after being compromised. Learn about the different ways in which the data is stolen, how cyber crooks monetize it, and steps you can take to be better protected.

DOWNLOAD RESOURCE September 17, 2018
threat intelligence esummit 2018

Sixgill Webinar at MIS/TI ESummit on Threat Intelligence – On Demand

Keeping up with cyber threats is a continual and time-intensive process. To allow the organization to operate with as little friction as possible, security, operations, and IT teams need to understand what data and systems they need to protect, who might be attempting unauthorized access, how adversaries might be approaching an attack, what tactics and techniques might be employed, and when (or if) that attack might hit. It’s a big problem, to say the least. Cyber threat intelligence helps organizations gain a grasp on their threat landscape and respond to emerging threats more quickly and effectively. But threat intelligence is only useful if it’s real intelligence and not just data. True threat intelligence isn’t a tool, an RSS feed, or even a bunch of correlated data. Threat intelligence is a product—a deliverable—which helps the entire organization understand the relevance of data found, the likelihood of an attack (based on the intelligence), and allows the security and/or ops team to take action.

Hear Sixgill’s presentation (On-Demand) at MISTI’s August 30, 2018 eSummit on Threat Intelligence and learn how automating the monitoring, collection and analysis of information from the deep and dark web and receiving prioritized alerts and customized actionable intelligence, can help organizations see the big picture of the threat landscape and obtain the necessary situational awareness to connect the dots to help prevent potential attacks.

Register for free, go to the Directory, Session Hall and Click on the second presentation: Demystifying the Dark Web.

demystifying the dark web threat intelligence webinar

Webinar – Demystifying the Dark Web: Why Threat Intel from Anonymous Networks is Critical

Threat intelligence is a critical factor in defending increasingly complex environments from sophisticated attacks. Join Sixgill and Forrester guest speaker Josh Zelonis for a fireside chat where we’ll explore how attackers are leveraging the deep and dark web, and how your organization can benefit from this type of intelligence.

DOWNLOAD RESOURCE February 20, 2018
Future Tech Podcast logo

Future Tech Podcast: Barry Spielman – Staying Safe on the Dark Web

In today’s world, cybersecurity’s at the top of everyone’s mind. But the DarkWeb seems beneath everyone’s attention. Why should most companies care about the DarkWeb when they’re doing business normally and legitimately, “above-ground,” so to speak? “Why do they care?” asks host Richard Jacobs.