Blog_Header.jpg

IntSights' Blog

The “Dark Web” is a growing buzzword in the world of cybersecurity and general technology. As it's grown in size and usage, various regions of the world have developed their own dark web communities and “codes of conduct” that can differ quite dramatically. One such region is Asia, whose...

Phishing is a popular social engineering tactic used by hackers, typically intended to dupe users into clicking on a link, opening a malicious file and/or giving away some sort of personal info. Sometimes the phishing attempt is the primary goal of the attack, like tricking a user to download...

Anonymous web browsers (like Tor and I2P) have created what has become known as the Dark Web, enabling users to access and host websites completely anonymously. Naturally, this has given rise to a large community of underground illegal black markets and forums, where users can buy or sell almost...

Since the WikiLeaks file dumps exposed commonly used CIA exploits, concerns have been mounting around government surveillance, begging the question of whether there should be any expectation of privacy in the digital world. For Tor and other software network servers, the ability to provide these...

Organizations face asymmetric and unprecedented risks from insiders — employees and contractors who have valid access to enterprise networks. Insider risk is on the rise in part due to the growing influence of the dark web, a portion of the internet that enables anonymity. The dark web is being...

McAfee Labs annual Threats Report released recently focuses on Information Theft and advises organisations to employ both internal mechanism (such as DLP) and external sources (such as cyber intelligence services) to increase the chance of identifying data leaks.

IntSights and Check Point Partner to Deliver Threat Intelligence Capabilities for Thwarting Cyber Attacks

Siphoning money from banks accounts has always been challenging for cyber criminals. A new tutorial exposed by IntSights Cyber Intelligence Analysts reveals some novel methods of accomplishing this.

An IntSights intelligence analyst has uncovered a store selling discounted diamonds, raw gold and rhino horns, from dubious suppliers who do not abide to international labor standards.

It appears that the popular cloud storage service, Dropbox, was hacked at some point in 2012. The hack was made public in late August, 2016. Account details of over 60 million users were leaked, including email addresses and hashed (encrypted) passwords: (...

IntSights Cyber Intelligence analysts discovered a new BOT comprised of infected Teamviewer users-

APT As A Service

Insights cyber intelligence analysts identified, for the first time, a tool set aimed to attack nation-states (APT ) sold as a service on the Darknet.  

The laws of economy state that if there’s a need for a product or service, there will be someone willing to offer it. If, however, one is in the market for something slightly bizarre or corrupt they need look no further than the Darknet marketplaces. Not surprisingly, the various goods and...