Blog_Header.jpg

IntSights' Blog

The “Dark Web” is a growing buzzword in the world of cybersecurity and general technology. As it's grown in size and usage, various regions of the world have developed their own dark web communities and “codes of conduct” that can differ quite dramatically. One such region is Asia, whose...

The Dark Web. In the minds of most consumers, it’s the Boogeyman’s cyber-playground. A land of digital anarchy, where guns, drugs and other black market items are traded freely for crypto-currency. There are low-lit individuals concealed in hoodies hovering over a keyboard and striking keys to...

When it comes to dark web black markets, anonymity is key. To help maintain their anonymity, dark web black market users leverage a variety of tools and technologies that mask their identity and location. It’s important to know how these tools are used so you can perform reconnaissance and...

Phishing is a popular social engineering tactic used by hackers, typically intended to dupe users into clicking on a link, opening a malicious file and/or giving away some sort of personal info. Sometimes the phishing attempt is the primary goal of the attack, like tricking a user to download...

The Dark Web has evolved over the past few years in many ways, but one of the biggest changes is the amount of information you can find via Dark Web forums and black markets. This increase in Dark Web data developed when hackers started focusing on new targets that weren’t in the landscape...

So, it's time to go to the bank again. As you wait in line, you look around and think about the security measures around you: big vaults, security cameras, and even bulletproof glass at the counter. On the surface, everything looks secure, but if a trained thief stood there instead of you, they...

The Dark Web has received a lot of attention recently, and is often portrayed as a scary, mysterious place where cyber criminals steal identities and purchase illegal goods. While this is true, the Dark Web can actually be a great source of threat intelligence. Hackers and Advanced Persistent...