dark web
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094816/insider_threat-400x200.jpg)
Shining a light on the dark web
Dark web marketplaces sell a plethora of tools, stolen data, and forged documents, and some of the things for sale are priced higher than the rest. The most expensive records …
![ImmuniWeb Discovery](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/18170038/immuniweb_discovery-400x200.jpg)
Product showcase: ImmuniWeb Discovery – attack surface management with dark web monitoring
Organizations around the globe struggle to identify their IT assets hosted in a multicloud environment, on premise or managed by numerous third parties. The lack of visibility …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104216/phishing-400x200.jpg)
EvilProxy phishing-as-a-service with MFA bypass emerged on the dark web
Following the recent Twilio hack leading to the leakage of 2FA (OTP) codes, cybercriminals continue to upgrade their attack arsenal to orchestrate advanced phishing campaigns …
![dark](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103342/dark-1-400x200.jpeg)
Does your cybercrime prevention program work?
KELA surveyed 400 security team members in the US who were responsible for gathering cybercrime threat intelligence daily to better understand if they’re proactively scanning …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100312/biohazard-400x200.jpg)
87% of the ransomware found on the dark web has been delivered via malicious macros
Venafi announced the findings of a dark web investigation into ransomware spread via malicious macros. Conducted in partnership with criminal intelligence provider Forensic …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093824/money-400x200.jpg)
Cybercrime goods and services are cheap and plentiful
Cybercrime is being supercharged through “plug and play” malware kits that make it easier than ever to launch attacks. Cyber syndicates are collaborating with amateur …
What stolen info can be bought off the dark web, and for how much?
Privacy Affairs researchers concluded criminals using the dark web can get a complete set of a person’s account details, enabling them to create fake IDs and forge private …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102343/face-400x200.jpg)
The price of stolen info: Everything on sale on the dark web
What is the price for personal information, including credit cards and bank accounts, on the dark web? Privacy Affairs researchers concluded criminals using the dark web need …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111213/voice-recognition-400x200.jpg)
Vishing cases reach all time high
Vishing (voice phishing) cases have increased almost 550 percent over the last twelve months (Q1 2022 to Q1 2021), according to the latest Quarterly Threat Trends & …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/10142332/phishing_green-hns1-400x200.jpg)
Welcome “Frappo” – Resecurity identified a new Phishing-as-a-Service
The Resecurity HUNTER unit identified a new underground service called “Frappo”, which is available on the Dark Web. “Frappo” acts as a Phishing-as-a-Service and enables …
![](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/02131300/question-400x200.jpg)
Fraudsters answer security questions better than customers
Pindrop released a report uncovering how companies might be accidentally inviting fraud, threat mongers from the dark web and bad actors better prepared to pass …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094816/insider_threat-400x200.jpg)
Posts on name-and-shame dark web leak sites climbed 85% in 2021
Ransomware payments hit new records in 2021 as cybercriminals increasingly turned to dark web leak sites where they pressured victims to pay up by threatening to release …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD