Blog_Header.jpg

IntSights' Blog

As long as banks have money, there will always be bank robberies. However, the shouts of “Nobody move, nobody gets hurt,” has been replaced by the dull clicks of hacker keystrokes halfway across the globe. Hackers treat banks as their personal ATMs. They slip in and out of hidden cyber tunnels...

The pharmaceutical industry is one of the most targeted industries on the web, especially in black market platforms. This comes as no surprise, as purchasing illegal substances has always been something that people are interested in, and where there is demand, there is a market. The price for...

The “Dark Web” is a growing buzzword in the world of cybersecurity and general technology. As it's grown in size and usage, various regions of the world have developed their own dark web communities and “codes of conduct” that can differ quite dramatically. One such region is Asia, whose...

The Dark Web. In the minds of most consumers, it’s the Boogeyman’s cyber-playground. A land of digital anarchy, where guns, drugs and other black market items are traded freely for crypto-currency. There are low-lit individuals concealed in hoodies hovering over a keyboard and striking keys to...

Phishing is a popular social engineering tactic used by hackers, typically intended to dupe users into clicking on a link, opening a malicious file and/or giving away some sort of personal info. Sometimes the phishing attempt is the primary goal of the attack, like tricking a user to download...

Anonymous web browsers (like Tor and I2P) have created what has become known as the Dark Web, enabling users to access and host websites completely anonymously. Naturally, this has given rise to a large community of underground illegal black markets and forums, where users can buy or sell almost...

The Dark Web has evolved over the past few years in many ways, but one of the biggest changes is the amount of information you can find via Dark Web forums and black markets. This increase in Dark Web data developed when hackers started focusing on new targets that weren’t in the landscape...

Since the WikiLeaks file dumps exposed commonly used CIA exploits, concerns have been mounting around government surveillance, begging the question of whether there should be any expectation of privacy in the digital world. For Tor and other software network servers, the ability to provide these...

Organizations face asymmetric and unprecedented risks from insiders — employees and contractors who have valid access to enterprise networks. Insider risk is on the rise in part due to the growing influence of the dark web, a portion of the internet that enables anonymity. The dark web is being...

Europol’s European Cybercrime Centre (EC3) recently published the “2016 Internet Organised Crime Threat Assessment (IOCTA)”. https://www.europol.europa.eu/iocta/2016/threat-areas.html

Rumour has it that Darknet is a sinister place, filled with abominable content. Well, in our experience it’s neither as dark nor as disturbing as people believe it to be - it is merely a platform for people to engage with others online in a manner that does not compromise their identity....

McAfee Labs annual Threats Report released recently focuses on Information Theft and advises organisations to employ both internal mechanism (such as DLP) and external sources (such as cyber intelligence services) to increase the chance of identifying data leaks.

IntSights and Check Point Partner to Deliver Threat Intelligence Capabilities for Thwarting Cyber Attacks

Siphoning money from banks accounts has always been challenging for cyber criminals. A new tutorial exposed by IntSights Cyber Intelligence Analysts reveals some novel methods of accomplishing this.