In this webinar, Alex and Kacey cover dark web trends that we have recently observed, the risk impact associated with cybercriminal behaviors, and mitigation strategies for your organizations’ digital risk on the dark web.
Other content in this Stream

In a few previous blogs, we’ve covered how threat actors discuss prison on Russian-language cybercriminal platforms. We’ve touched on high-profile ...

As a threat intelligence professional, it’s difficult to ignore how major developments in the real world affect the lives of ...

You’d have to have been living under a rock to have avoided the excitement surrounding Non-Fungible-Tokens (NFTs) in the last ...

As the new year has reached the end of its first quarter, it’s time for us to go back and ...

Since Russia’s invasion of Ukraine in February, the Digital Shadows Photon team has been following multiple aspects of the tragic ...

This guide shares years of operational best practices and expands on where dark web intelligence is useful and can be effectively leveraged into action for security teams.
The visibility needed to detect fraud and track threat actors.
Improve your understanding of the dark web threat landscape and legal precautions to consider when establishing dark web monitoring within your security teams.

Gaining access to dark web and deep web sources can be extremely powerful – if you focus on relevant use cases. The most successful strategies we observe have clear requirements, such as fraud detecti

Join us for us for an informative session on the 7 most prolific threats on the dark web and strategies to harden your defenses to prevent becoming a victim.
This report explores both the benign and malevolent activities of the dark net, and the dark web.

Gain visibility into criminal and fraudulent activity impacting your brand on the deep and dark web. Learn more at https://www.digitalshadows.com/dark-web-monitoring/

While there are enumerate situations in which a dark web monitoring program can pay dividends, we’re going to cover the top five use cases.

When a format tries to repeat its former glory it doesn’t quite live up to its predecessor. This phenomenon can also be seen in the cybercriminal world.

In this blog, we’ll examine the different ways in which cybercriminal sites have come to an end and provide examples for each.