Deep Web

Analyzing the attack landscape of the Dark Web. There is no honor among thieves.Analyzing the attack landscape of the Dark Web. There is no honor among thieves.

Analyzing the attack landscape of the Dark Web. There is no honor among thieves.

Security researchers at Trend Micro used Tor honeypots to conduct a six-months study of the attack landscape of the Dark…

8 years ago
Police seized two Tor relays investigating WannaCry attack, others disappeared in the same periodPolice seized two Tor relays investigating WannaCry attack, others disappeared in the same period

Police seized two Tor relays investigating WannaCry attack, others disappeared in the same period

France’s cyber-crime investigation unit OCLCTIC seized one server running two Tor Relays Investigating the WannaCry attack. A few days after…

8 years ago
New Tor Browser 7.0 implements multiprocess mode, content sandbox, and Unix domain socketsNew Tor Browser 7.0 implements multiprocess mode, content sandbox, and Unix domain sockets

New Tor Browser 7.0 implements multiprocess mode, content sandbox, and Unix domain sockets

The Tor Project Team has announced the release of Tor Browser 7.0, it comes with multiprocess mode, content sandbox, and…

8 years ago
Dark Web users of a child porn website tracked after visiting file sharing siteDark Web users of a child porn website tracked after visiting file sharing site

Dark Web users of a child porn website tracked after visiting file sharing site

The U.S. Department of Homeland Security has identified dark web users after they downloaded media through a file sharing services. The…

8 years ago
Zomato Data breach – Nearly 17 million usernames and hashed passwords stolenZomato Data breach – Nearly 17 million usernames and hashed passwords stolen

Zomato Data breach – Nearly 17 million usernames and hashed passwords stolen

Nearly 17 million Zomato usernames and hashed passwords have been stolen by hackers., the company suspects it is an insider's…

8 years ago
Hackers are selling fake diplomas and certifications in the dark webHackers are selling fake diplomas and certifications in the dark web

Hackers are selling fake diplomas and certifications in the dark web

According to Israeli threat intelligence firm Sixgill, certifications and fake diplomas are very cheap and easy to buy in the…

8 years ago
European law enforcement takes down Darknet marketplaceEuropean law enforcement takes down Darknet marketplace

European law enforcement takes down Darknet marketplace

Europol supported the Slovak NAKA crime unit in an operation that resulted in the seizure of the Bloomsfield darknet marketplace.…

8 years ago
Graph theory applied to a portion of the Dark Web shows it a set of largely isolated dark silosGraph theory applied to a portion of the Dark Web shows it a set of largely isolated dark silos

Graph theory applied to a portion of the Dark Web shows it a set of largely isolated dark silos

A group of researchers conducted a study on the Dark Web leveraging the Graph theory. This hidden space appears as…

8 years ago
US Court sentenced Russian hacker Roman Seleznev to 27 years in jail for hackingUS Court sentenced Russian hacker Roman Seleznev to 27 years in jail for hacking

US Court sentenced Russian hacker Roman Seleznev to 27 years in jail for hacking

Roman Seleznev, the son of the prominent Russian Parliament member Valery Seleznev was sentenced to 27 years in jail for…

8 years ago
Anatomy of Cybercriminal Communications: Why do crooks prefer SkypeAnatomy of Cybercriminal Communications: Why do crooks prefer Skype

Anatomy of Cybercriminal Communications: Why do crooks prefer Skype

Security firm Flashpoint published an interesting paper titled, 'Cybercrime Economy: An Analysis of Cybercriminal Communication Strategies' about cybercriminal communications of threat…

8 years ago