Latest Blog Posts

Keep up to date with all things Searchlight Security, as well as all the latest news from Darkweb
Searchlight Security ISO 27001 Accreditation Searchlight Security Cyber Essentials Accreditation
Financial Crimes on the Dark Web

28 June 2022

Blog

This blog - the first in a two-part series on securing financial services from dark web threats - examines financial crimes that target consumers and how they could be prevented by financial services companies with dark web intelligence.
Read More
Shifting Security Left in the Cyber Kill Chain

24 June 2022

Blog

The earlier you can identify a threat actor in the Cyber Kill Chain, the more likely you are to prevent an attack. This blog looks at how dark web intelligence can help identify cybercriminal activity in stage one: Reconnaissance.
Read More
Three Times Supply Chain Compromise Was Visible on the Dark Web

14 June 2022

Blog

Dark web intelligence can inform supply chain compromise prevention by identifying when and how a businesses’ third parties are being targeted. An examination of dark web activity at the time of the Maersk, Kronos and Kaseya attacks demonstrates the tell-tale signs that threat actors were targeting these supply chains.
Read More
Verizon DBIR 2022: Combating Criminal Efficiency

26 May 2022

Blog

Verizon has released its annual Data Breach Investigations Report, which outlines the continued rise of ransomware, supply chain attacks, and the most common routes into an organization. This blog looks at how early warning signs on the deep and dark web could combat this increasing criminal efficiency.
Read More
Conti Attack on Costa Rica: Who is UNC1756?

18 May 2022

Blog

Since mid-April, multiple agencies of Costa Rica's government have endured an onslaught of threat activity claimed by infamous ransomware gang Conti. Searchlight's threat intelligence team investigates what makes this attack unique, and who could be the driving force behind it.
Read More
Clear, Deep, and Dark Web: Beyond the Iceberg

26 April 2022

Blog

In cybersecurity discourse, phrases such as clear, deep, and dark web are often used in various contexts to mean different things. We’ve prepared a quick guide on the differences between these parts of the internet, how they're leveraged by cybercriminals, and busting some common misconceptions.
Read More
How Tor Works

26 April 2022

Blog

We all know Tor as the go-to tool for online anonymity, but how does it work? This blog explains, as well as covering its primary use-case demographics.
Read More
Hydra's Collapse Forces Cybercriminals to Regroup

14 April 2022

Blog

Hydra, the world's largest and longest-serving dark web market, was forced offline last week following the seizure of its server infrastructure in Germany. Searchlight's analyst team observed where cybercriminals are flocking to after the takedown, and what they plan to do next.
Read More
LAPSUS$: The Next Generation of Financial Threat Actors?

23 March 2022

Blog

LAPSUS$ has been making waves in the data extortion scene, becoming increasingly ambitious and outspoken with each attack. Searchlight explored the group's origins, tactics, and controversies in order to better understand its position in the current threat landscape.
Read More