This site uses cookies to give you the best user experience. This includes collecting anonymous, aggregated statistics on user visits so that we can identify optimal presentation of our content.
This blog - the first in a two-part series on securing financial services from dark web threats - examines financial crimes that target consumers and how they could be prevented by financial services companies with dark web intelligence.
The earlier you can identify a threat actor in the Cyber Kill Chain, the more likely you are to prevent an attack. This blog looks at how dark web intelligence can help identify cybercriminal activity in stage one: Reconnaissance.
Dark web intelligence can inform supply chain compromise prevention by identifying when and how a businesses’ third parties are being targeted. An examination of dark web activity at the time of the Maersk, Kronos and Kaseya attacks demonstrates the tell-tale signs that threat actors were targeting these supply chains.
Verizon has released its annual Data Breach Investigations Report, which outlines the continued rise of ransomware, supply chain attacks, and the most common routes into an organization. This blog looks at how early warning signs on the deep and dark web could combat this increasing criminal efficiency.
Since mid-April, multiple agencies of Costa Rica's government have endured an onslaught of threat activity claimed by infamous ransomware gang Conti. Searchlight's threat intelligence team investigates what makes this attack unique, and who could be the driving force behind it.
In cybersecurity discourse, phrases such as clear, deep, and dark web are often used in various contexts to mean different things. We’ve prepared a quick guide on the differences between these parts of the internet, how they're leveraged by cybercriminals, and busting some common misconceptions.
We all know Tor as the go-to tool for online anonymity, but how does it work? This blog explains, as well as covering its primary use-case demographics.
Hydra, the world's largest and longest-serving dark web market, was forced offline last week following the seizure of its server infrastructure in Germany. Searchlight's analyst team observed where cybercriminals are flocking to after the takedown, and what they plan to do next.
LAPSUS$ has been making waves in the data extortion scene, becoming increasingly ambitious and outspoken with each attack. Searchlight explored the group's origins, tactics, and controversies in order to better understand its position in the current threat landscape.