Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Travelling Through the Dark Web: Answering 6 Questions About Dark Web "Travel Agencies"

It’s a well-known fact that threat actors use stolen personal data for many purposes ranging from launching phishing attacks, gaining access to an employer, or very commonly using credit card information to make purchases. What has also become somewhat common in the last eight or so years is using stolen information to support grander illegal enterprises like supplying air and hotel travel at heavily reduced prices via dark web travel agencies.

No Tell Motel: Trustwave Exposes the Secrets of Dark Web Travel Agencies

Dark web travel agencies have emerged as one of the more sophisticated and lucrative operations within the underground economy. As mentioned in the Wall Street Journal's coverage of Trustwave’s research, these shadowy enterprises offer dramatically discounted flights, luxury hotel stays, rental vehicles, and entire vacation packages, all facilitated through stolen credit card information, compromised loyalty program accounts, and forged identification documents.

Trustwave SpiderLabs Investigates the Dark Web's Role in Supply Chain Attacks

One of the most dangerous aspects of the dark web is that it provides like-minded threat actors a haven to gather, discuss, develop, and sell access to technology companies, which are often the first link in a supply chain attack. Alternatively, it's an environment where those looking to enter the world of cybercrime and initiate a third-party attack can buy the tools necessary to begin their operation. Trustwave SpiderLabs report Technology Industry Deep Dive.

Email Leaked to the Dark Web? Risks & Fixes Explained

Having email on the dark web is disturbing and more indicative of the fact that you are a target for cybercriminals. If your email address has been found in leaks stemming from a major data breach or somewhere due to unkept security, it makes you more vulnerable to identity theft, financial fraud, or personal extortion. But exactly what happens if your email is on the dark web?

Dark Web Monitoring with Continuous Attack Surface Management

JUMPSEC explains how CASM -continuous attack surface management adds another layer of intelligence. CASM continuously monitors dark web forums, illicit marketplaces, and underground communities where threat actors discuss vulnerabilities, trade stolen credentials, and plan their next attacks. Uncovering early warning signs that traditional tools miss.