Search results for: dark markets

dark

Increased dark web activity putting merchants and consumers at risk

Cybercriminals are increasingly targeting retailers and their customers through digital and social channels as retailers leverage new channels for increased revenue opportunities. In a joint report, IntSights scoured the Clear and Dark Web to assess retail data and goods being sold illegally, new cyber scam tactics and how cybercriminals impersonate brands online to trick unknowing consumers. Riskified analyzed the transaction-level results of hundreds of millions of purchases for indicators of fraud to identify trends and … More

Quantum Xchange selects Zayo Group for dark fiber to deploy Quantum network in the United States

Quantum Xchange partners with Zayo Group to deploy the first Quantum Key Distribution (QKD) network in the United States. As Quantum Xchange’s first strategic infrastructure partner, Zayo is providing access to 800 kilometers of existing optical fiber that spans from Boston to Washington, D.C. Quantum Xchange will use the dark fiber to activate the initial leg of its nationwide QKD network – connecting the financial markets on Wall Street with back office operations in New … More

threat hunting

Why humans are necessary to the threat hunting process

For thousands of years, humans have worked to collect intelligence on their enemies. Intelligence gathering is not a new practice; in fact, it is one of the oldest war tactics dating back to biblical times, when warlords and army commanders used it to gain advantages over their rivals. However, the methods have changed as new technologies and new forms of “warfare” have been developed. In recent years, cyber-attacks have led to an entirely new host … More

dark

Top 10 list of dark web activities that indicate a breach

Research analysts at Terbium Labs released a list of the most common activities seen on the dark web that indicate a breach, or other unwanted incident, has taken place. Despite increased security budgets and better defenses, organizations are losing the battle against cyber attacks. According to the 2018 Cost of Data Breach Study: Global Overview by Ponemon Institute and IBM Security, data breaches continue to be costlier and result in more consumer records being lost … More

technology

Week in review: The OT/ICS landscape for cyber professionals, putting the Sec into DevSecOps

Here’s an overview of some of last week’s most interesting news: How to allocate budget for a well-rounded cybersecurity portfolio What should a well-rounded cybersecurity portfolio look like? Android devices with pre-installed malware sold in developing markets New low-end Android smartphone devices being sold to consumers in developing markets, many of whom are coming online for the first time, contain pre-installed malware, according to Upstream. An overview of the OT/ICS landscape for cyber professionals Most … More

building

Threats financial organizations will face in 2019

What type of threats will financial services and banking organizations face in 2019? According to IntSights Cyber Intelligence, they should be prepared for breaches effected through compromise of established vendor software or SaaS products, and vulnerable third-party, open source software implemented in the applications they use. Also: extortion attempts. “Regulation fines and brand reputation damage can be way more costly than downtime or lost data. Given the large fines for GDPR laws and massive data … More

airport

Access to airport’s security system sold on dark web

Leveraging compromised RDP credentials is one of the easiest ways attackers can break into company networks and systems. Unfortunately for all of us, there are a lot of vendors on underground hacker markets that sell those credentials for a laughably small amount of money. Some of these computers are part of critical systems. Case in point: McAfee researchers have recently discovered that access linked to security and building automation systems of a major international airport … More

Quantum Xchange raises $10 million funding to bring its QKD network to market

Quantum Xchange launches quantum, fiber-optic network in the United States and commercial Quantum Key Distribution (QKD) service for quantum-safe data protection based on the laws of quantum physics. Leveraging the company’s Trusted Node technology, the Quantum Xchange QKD network extends the technology beyond the previous limitations of transmission distances, to offer commercial enterprises and government entities point-to-point support over unlimited distances. In doing so, Quantum Xchange provides hardened encryption available to address the shortcomings of … More

person

Early detection of compromised credentials can greatly reduce impact of attacks

According to Blueliv’s credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and Russia, compared to the same period in 2017 (January-May). In fact, Europe and Russia are now home to half of the world’s credential theft victims (49%). In this podcast, Patryk Pilat, Head of Engineering and Cyberthreat Intelligence at Blueliv, talks about the report, and illustrates how these startling … More

Telegram

Cybercriminals are turning to Telegram due to its security capabilities

Check Point researchers have revealed that cybercriminals are increasingly exploiting the popular messaging app, Telegram, to exchange information, recruit new partners and evade authorities. Prominent Russian channels Criminals are turning to Telegram because law enforcement has been successful recently in taking down Dark Web marketplaces and forums, such as Hansa Market and AlphaBay. Telegram is easy to access and offers good security capabilities, so some of its hosted chat groups have become a useful alternative … More

Inside the plane

How cybercriminals abuse the travel and hospitality industry

The travel and hospitality industry suffers billions of losses each year due to fraud. “With the right combination of other underground services (compromised accounts, credit cards, etc.) it is possible to cover almost every aspect of the holidays, including food and restaurants, shopping, entertainment, guided tours and more – way beyond flights and hotels,” Vladimir Kropotov, Researcher at Trend Micro, told Help Net Security. What’s on offer? Kropotov and his colleagues have been rifling through … More

cybercrime

The global impact of huge cyber security events

The past 12 months have seen a number of unprecedented cyber-attacks in terms of their global scale, impact and rate of spread. Already causing widespread public concern, these attacks only represent a small sample of the wide array of cyber threats we now face. Europol’s Executive Director Rob Wainwright: “The global impact of huge cyber security events such as the WannaCry ransomware epidemic has taken the threat from cybercrime to another level. Banks and other … More