As Black Friday and Cyber Monday deals continue throughout the holiday season, millions of consumers will log on to snag the best offers of the year. But they arenโt the only ones on the hunt for seasonal discounts. Cybercriminals, too, flock to dark markets, browsing for their version of โstealsโ on an assortment of unconventional goods and services. In a digital underground that mirrors traditional e-commerce in many ways, these markets cater to buyers with specific โ and often illegal needs.
The following explores parallels with dark markets and conventional online shopping including operations, payments, and even advertising.
Dark Market Goods and โDealsโ
While Amazon, Target, Home Depot and ...
The Voice of Cyberยฎ
Threat Intelligence
Threat Intelligence is a cornerstone of effective cybersecurity involving the collection, analysis, and dissemination of information about potential cyber threats to inform decision-making and enhance an organisation’s security posture. Threat intelligence encompasses data on emerging vulnerabilities, attack techniques, and the tactics employed by threat actors.
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware ...
Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as ...
Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but ...
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Pythonโs, PyPIโs and Python Software Foundationโs ...
Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentinaโs shootout win over France in the final game of the ...
In The News
Sort By
- Date
- Title
Predicting the future isnโt easy, but you can anticipate what is likely to happen by looking at how things have evolved over the past year. This year again, Barracuda asked ...
The ASD just released its Annual Cyber Threat Report and some of the incidents outlined were the result of exploiting public-facing applications and compromised accounts or ...
On Tuesday, November 19, 2024, Adam Meyers, CrowdStrike Senior Vice President of Counter Adversary Operations, willย testifyย in front of the U.S. Senate Judiciary Subcommittee ...
Tenable, the exposure management company, has disclosed that its Tenable Cloud Security Research team has uncovered new attack techniques in Domain-Specific Languages (DSLs) ...
Arctic Wolfยฎ, a global leader in security operations, today announced the expansion of theย Arctic Wolf AuroraTMย Platformย with the addition of Arctic Wolf Threat Intelligence, ...
The bot landscape is changing. Malicious โ or bad bots โ are evolving to become more advanced and human-like in their behavior, while an emerging category of AI bots, which ...
Podcasts On Threat Intelligence