Blog_Header.jpg

IntSights' Blog

Anonymous web browsers (like Tor and I2P) have created what has become known as the Dark Web, enabling users to access and host websites completely anonymously. Naturally, this has given rise to a large community of underground illegal black markets and forums, where users can buy or sell almost...

The Dark Web has evolved over the past few years in many ways, but one of the biggest changes is the amount of information you can find via Dark Web forums and black markets. This increase in Dark Web data developed when hackers started focusing on new targets that weren’t in the landscape...

Whether you’ve visited the Dark Web or not, you’re likely aware that it’s comprised of various anonymous forums and black markets. Many of these Dark Web black markets are used for illegal activities, like buying and selling drugs, weapons, confidential documents and illegal services. While you...

So, it's time to go to the bank again. As you wait in line, you look around and think about the security measures around you: big vaults, security cameras, and even bulletproof glass at the counter. On the surface, everything looks secure, but if a trained thief stood there instead of you, they...

The Dark Web has received a lot of attention recently, and is often portrayed as a scary, mysterious place where cyber criminals steal identities and purchase illegal goods. While this is true, the Dark Web can actually be a great source of threat intelligence. Hackers and Advanced Persistent...

You've likely heard of the Dark Web, but do you really know what it is and how it's used? There’s a lot of hype and confusion surrounding the Dark Web these days, but it can actually be an asset in protecting your organization from cyber crime. IntSights' Chief Product Officer, Alon Arvatz,...

An ad uploaded to a Russian underground black market a few days ago allegedly offers a new and improved version of the infamous banking malware Asacub. This Android malware was originally designed to steal user data and send it to a remote server, but in January 2016, cybersecurity company...

A recent New York Times article reports that a Ukrainian hacker nicknamed ‘Profexer’ reportedly turned himself in to the FBI for assisting the Russian-run campaign to sway the 2016 US elections, dubbed “Grizzly Steppe”.

The alleged campaign included hacking the DNC and leaking its data online,...

Last week’s HBO hack led to the release of sensitive information about HBO executives, contact lists, and -- most salacious for the media -- scripts and low-res copies of brand new “Game of Thrones” episodes. While the hacks have not led to any decrease in viewership for the epically popular...

Exploit Kits (EK’s) have been around for at least the past decade, and every time one gets taken down, it’s only a matter of time before a new, more sophisticated one pops up on the Dark Web. Now there’s a new kid on the block named “Disdain.”

Organizations face asymmetric and unprecedented risks from insiders — employees and contractors who have valid access to enterprise networks. Insider risk is on the rise in part due to the growing influence of the dark web, a portion of the internet that enables anonymity. The dark web is being...

The laws of economy state that if there’s a need for a product or service, there will be someone willing to offer it. If, however, one is in the market for something slightly bizarre or corrupt they need look no further than the Darknet marketplaces. Not surprisingly, the various goods and...