Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Dark Web

What Are Dark Web Scans?

Dark web scans, also known as data breach scans, are scans that let you know if your personal information, such as your email and login credentials, is on the dark web. There are several free and paid dark web scans available online to use and each of them works differently. Continue reading to learn what the dark web is, how dark web scans work and how to initiate a dark web scan.

What To Do if Your Credit Card Information Is on the Dark Web

If your credit card information is on the dark web you need to immediately contact your credit card issuer, monitor your online accounts for any suspicious activity or transactions, check your credit report and place a fraud alert on your credit report as an extra precaution. Continue reading to learn how your credit card information could have gotten on the dark web and how to keep your credit card information safe in the future.

How Cybercriminals Use the Dark Web to Undermine Security

Major search engines merely scratch the surface, exploring 4% of the vast web. Concealed within the deep web, the dark web emerges as a hub for cybercriminal activities. This covert digital underworld operates anonymously outside conventional browsers, providing an ideal haven for cybercriminal coordination beyond law enforcement's grasp.

Applying an intelligence-based approach to Cybersecurity; SIEM and dark web monitoring

“History repeatedly has demonstrated that inferior forces can win when leaders are armed with accurate intelligence.” – Central Intelligence Agency; Intelligence in War In the ever-changing landscape of global cybersecurity, the boundaries between traditional military intelligence and cybersecurity are increasingly blurred. At the heart of this convergence lies the science of intelligence analysis—a process fundamental to both realms.

Ex-Navy IT manager jailed for selling people's data on the dark web

A former US Navy IT manager has been sentenced to five years and five months in prison after illegally hacking a database containing personally identifiable information (PII) and selling it on the dark web. 32-year-old Marquis Cooper, of Selma, California, was a chief petty officer in the US Navy's Seventh Fleet when he opened an account in August 2018 with a company that maintains a PII database for millions of people.

Harvested Credentials Are Put Up for Sale Monthly on the Dark Web at a Rate of 10,000 a Month

Credential harvesting has become a business in and of itself within the cybercrime economy. New insight from Microsoft details the types of attacks your organization should watch out for. I’ve attempted to cover every Microsoft 365 credential harvesting attack since the platform is so popular and is an easy target for cybercriminals. But the news coming from their newly-released Microsoft Digital Defense Report 2023 puts this type of attack into perspective.

Demystifying the Dark Web and DarkNets, Part V-FINs, APTs, Rogues, Hacktivists, Cyber Warriors, and Accidentals

In our last installment of this series, we were introduced to some dangerous characters one might encounter on darknets. This week, we will finish out that list, looking into both organized groups and individuals. Wrapping my head around why people do what they do, and how they execute operations that end up costing corporations millions, is always fascinating.

7 Best Practices for Dark Web Scanning

It would be great if Dark Web scans were as simple as Google searches – if you could simply plug your business’s name into a search engine, run a query and view a list of results about threats that impact your company. Unfortunately for businesses seeking to stay a step ahead of threat actors, quite the opposite is true. It’s not just that there is no Google or search index that teams can turn to when searching for threats.

Demystifying the Dark Web and DarkNets, Part IV - Corporate Spies, Scammers, Spammers, Stalkers, and Cyber Criminals

September 7, 2023 Author: Anonymous Hacker, as told to Lindsey Watts Preface: Thus far in our series, we’ve looked at what DarkNet types exist in addition to the dark web, communication methodologies on DarkNets, social-ethical questions raised by anonymous, and unregulated and un-censored communication platforms. Your interest might be piqued at this point but if not hold onto your seat because it’s about to be.