Dark Web Monitoring

Learn how to monitor for digital risks to your organization on the dark web and criminal underground.

  • Dark Web Monitoring: The Good, The Bad, and The Ugly

    Dark Web Monitoring: The Good, The Bad, and The Ugly

    Gaining access to dark web and deep web sources can be extremely powerful – if you focus on relevant use cases. The most successful strategies we observe have clear requirements, such as fraud detecti

    Read Post
  • Gain visibility into criminal and fraudulent activity impacting your brand on the deep and dark web

    Learn More
  • Cybercriminal credit card stores: Is Brian out of the club?

    Cybercriminal credit card stores: Is Brian out of the club?

    In this blog, we determine whether this targeted attack on BriansClub will impact the wider cybercriminal credit carding landscape, and speculate whether it could galvanize the community to push anoth

    Read Post
  • Understanding the Different Cybercriminal Platforms: AVCs, Marketplaces, and Forums

    Understanding the Different Cybercriminal Platforms: AVCs, Marketplaces, and Forums

    We’re all familiar with forums and marketplaces (we use them in our daily lives – think Reddit, eBay, or Amazon, for example), but what exactly is an AVC? What do they look like?

    Read Post
  • Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

    Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

    How can the modern network of .onion marketplaces be understood through novels about a cyberpunk dystopia? The answer is in how dark web marketplaces grow and die.

    Read Post
  • Cybercriminal Forum Developments: Escrow Services

    Cybercriminal Forum Developments: Escrow Services

    On Russian- and English-language cybercriminal forums on the clear and dark web, vendors are increasingly asking interested buyers to place money in a forum escrow service before they will provide fur

    Read Post
  • Check out our Weekly Intelligence Summary

    Access Here
  • Digital Shadows Dark Web and Deep Web Intelligence Datasheet

    Digital Shadows Dark Web and Deep Web Intelligence Datasheet

    Learn the importance of Dark and Deep Web Source Intelligence to Minimize your Digital Risk.

    Read Report
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Dark Web Typosquatting: Scammers v. Tor

    Dark Web Typosquatting: Scammers v. Tor

    Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can ...

    Read Post
  • BlueKeep Attacks, Megacortex Ransomware, and Web.com Breach

    BlueKeep Attacks, Megacortex Ransomware, and Web.com Breach

    This week the London team looks at the following stories: - BlueKeep Exploit Could Rapidly Spread - Megacortex Ransomware Changes Windows Passwords - Japanese Media Company Nikkei - $29 million...

    Read Post
  • Envoy on a Mission to Bring Stability to the Criminal Underground

    Envoy on a Mission to Bring Stability to the Criminal Underground

    All this turbulence has resulted in significant disruption and unrest within the overall cybercriminal scene and, in particular, has left a vacuum for English-language forums. It’s within this context

    Read Post
  • Fresh blow for dark web markets: Nightmare market in disarray

    Fresh blow for dark web markets: Nightmare market in disarray

    Over the past three weeks, Digital Shadows has observed another popular dark web criminal market – Nightmare – experience several ...

    Read Post
  • Heard our ShadowTalk Threat Intelligence Podcast?

    Subscribe Here!
  • Mitigating the Top 7 Dark Web Threats to Your Enterprise59:01

    Mitigating the Top 7 Dark Web Threats to Your Enterprise

    oin us for us for an informative session on the 7 most prolific threats on the dark web and strategies to harden your defenses to prevent becoming a victim.

    Watch Video
  • ×

    Request a
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • A Growing Enigma: New AVC on the Block

    A Growing Enigma: New AVC on the Block

    This week, in a ground breaking announcement, the Bank of England named Alan Turing the new face of the £50 ...

    Read Post
  • Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence

    Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence

    We’re back in London this week! Viktoria chats with Adam Cook, Philip Doherty, and Josh Poole on this week’s top stories. - APT35 Targets Email of US political figures & prominent Iranians -...

    Read Post
  • Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework

    Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework

    When the attacker, Andrei Tyurin, pleaded guilty, we thought we could look at the attacker goals, their TTPs and map this to the Mitre PRE-ATT&CK and ATT&CK framework.

    Read Post
  • Tortoiseshell Targets IT Providers, The Tyurin Indictment, And Emotet’s Return

    Tortoiseshell Targets IT Providers, The Tyurin Indictment, And Emotet’s Return

    The team digs into the first story of the week: Tortoiseshell Group (a newly identified threat group) has reportedly conducted some supply chain attack campaigns against 11 IT providers in Saudi Arabi

    Read Post
  • Too Much Information: The Sequel | New Research

    Too Much Information: The Sequel | New Research

    There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.

    Read Report
  • FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar50:49

    FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar

    Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr

    Watch Video
  • Thedarkoverlord runs out of Steem

    Thedarkoverlord runs out of Steem

    On 31 December 2018, the notorious extortion actor known as “thedarkoverlord” announced on Twitter and Reddit that they were in ...

    Read Post
  • A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.

    Read Report
  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • loading
    Loading More...