Blog_Header.jpg

IntSights' Blog

Anonymous web browsers (like Tor and I2P) have created what has become known as the Dark Web, enabling users to access and host websites completely anonymously. Naturally, this has given rise to a large community of underground illegal black markets and forums, where users can buy or sell almost...

The Dark Web has evolved over the past few years in many ways, but one of the biggest changes is the amount of information you can find via Dark Web forums and black markets. This increase in Dark Web data developed when hackers started focusing on new targets that weren’t in the landscape...

In our modern age of digital connections and ubiquitous Internet access, both organizations and individuals face a “double-edged sword” when using web-based technologies. As we’ve increased our usage of the World Wide Web, our digital footprints have grown exponentially, and as a result, so has...

Whether you’ve visited the Dark Web or not, you’re likely aware that it’s comprised of various anonymous forums and black markets. Many of these Dark Web black markets are used for illegal activities, like buying and selling drugs, weapons, confidential documents and illegal services. While you...

So, it's time to go to the bank again. As you wait in line, you look around and think about the security measures around you: big vaults, security cameras, and even bulletproof glass at the counter. On the surface, everything looks secure, but if a trained thief stood there instead of you, they...

The Dark Web has received a lot of attention recently, and is often portrayed as a scary, mysterious place where cyber criminals steal identities and purchase illegal goods. While this is true, the Dark Web can actually be a great source of threat intelligence. Hackers and Advanced Persistent...

Browsing the Internet has become a minefield, where nearly any web page has the potential to infect a visitor’s endpoint (i.e., the user) and the endpoint's entire internal network (i.e., the organization). If users are not careful, they can trigger malicious malware downloads or get fooled by a...

As the cyber threat landscape continues to evolve, it's important to have tailored, actionable intelligence you can use to anticipate cyber attacks and data leakage. Organizations need to start looking beyond their perimeter to monitor their digital footprint and view their organization like an...

2017 was a historic year for cybersecurity. The estimated number of records stolen through 2017 doubled from 2016 (from 1.38 billion to 2.7 billion). In addition, the world was hit with unprecedented ransomware attacks, like WannaCry (which we just celebrated the 1 year anniversary of). This has...

You've likely heard of the Dark Web, but do you really know what it is and how it's used? There’s a lot of hype and confusion surrounding the Dark Web these days, but it can actually be an asset in protecting your organization from cyber crime. IntSights' Chief Product Officer, Alon Arvatz,...

On May 12, 2017, WannaCry ransomware surprised the world and began spreading across hundreds of thousands of computers around the globe. To build the attack, WannaCry’s creators exploited an EternalBlue vulnerability, which was stolen by the Shadow Brokers from the NSA (National Security...

With the cybersecurity threat landscape growing and evolving rapidly, many enterprises and other large organizations are seeking more effective ways to protect themselves and their employees from these threats. Threat intelligence platforms can help you take a more proactive approach to managing...

Last week, Brian Krebs, who runs the popular security blog KrebsOnSecurity, published some interesting research about how employees are posting corporate login credentials within tools that are exposed to web searches. In particular, he looked at Trello.com, a popular collaboration and project...

As cyber attacks continue to grow in size, scope and complexity, organizations across the world are forced to find new ways to protect themselves and mitigate these cyber threats. This has given rise to many Cyber Threat Intelligence (CTI) solutions and services, which all serve the purpose of...