The Genesis Market & Infostealer Malware Threat: What You Need to Know

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "The Genesis Market & Infostealer Malware Threat: What You Need to Know." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

One of the most challenging developments in recent years in defending against cyber attacks is the emergence of cyber crime marketplaces. Often accessible on both the dark and clear web, these marketplaces offer an outlet for threat actors to trade in stolen information, hacking tools, and even hacking services.  This article focuses on the popular […]

Telegram Fraud & Cybercrime: A Rising Concern in 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Telegram Fraud: A Rising Concern in 2023." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Criminals are consistently looking for new ways to exploit consumers and businesses. Today’s online communication channels, such as social media and messaging apps, have recently become a prime target for many scammers. One cyber threat trend that has been increasing is the issue of Telegram cybercrime scams.  Threat actors routinely use Telegram to share leaked […]

How the Dark Web is Embracing ChatGPT and Generative AI

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "How the Dark Web is Embracing ChatGPT and Generative AI." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

ChatGPT and GPT-4 have been dazzling their users with their linguistic prowess. But, have you ever wondered if (and how) these large language models (LLMs) are also making a splash in the darker corners of the internet? It turns out that threat actors are indeed finding creative ways to exploit the technological marvels of generative […]

Threat Spotlight: Generative AI

A navy background with the white text "Generative AI."

Two converging trends are on the precipice of reshaping the cyber threat landscape dramatically. The world is in the midst of a technological revolution that looks likely to cause significant and disruptive changes to society. Generative AI applications are poised to revolutionize the way we work, learn, and interact with our environment. Unlike some previous […]

Threat Actors: The Definitive 2023 Guide to Cybercriminals

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Actors: The Definitive 2023 Guide to Cybercriminals." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

In a digital world, companies collect more data and more types of data than ever before. As people use more technology, they generate new types of sensitive data. While data protection laws and compliance frameworks often detail categories of information requiring enhanced protection, they fail to keep pace with technological advances. When people understand the […]

Threat Spotlight: Dark Web Supply Chain

A navy background with the white text "Dissecting the Dark Web Supply Chain."

Executive Overview Stealer logs are a threat for every company. Threat actors infect devices with stealer malware, exfiltrate the browser fingerprints & saved logins in the browser, and sell them on dedicated dark web marketplaces for less than $50. Breaches caused by stealer logs can cause hundreds of thousands if not millions of dollars of […]

Top Russian Cybercrime Forums in 2023

Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Top Russian Cybercrime Forums in 2023." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Cybercrime forums provide an outlet for threat actors to coordinate, exchange information, and conduct illicit trades. Often hosted on the dark web (but sometimes accessible via the clear web), these forums are hubs of malicious activity. The typical structure of a cybercrime forum sees a dedicated marketplace section that facilitates the sale of stolen credentials, […]

Threat Spotlight: Threat Intelligence & Geopolitical Risk in 2023

A navy background with the white text "Threat Intelligence & Geopolitical Risk in 2023."

Executive Overview How do geopolitics affect cybersecurity for organizations in different areas of the world? Holden Triplett has years of experience in national security issues, including his role as the former Director of Counterintelligence at the National Security Council in the U.S. White House. In his role, he focused on coordinating policies to address U.S. […]

Threat Spotlight: AI and Machine Learning

A navy background with the white text "AI & Machine Learning."

Executive Summary Check out our full webinar recording, AI and Machine Learning: The Future of Cybersecurity in 2023, and/or keep reading for the highlights. AI and Cybersecurity Applications There’s a misconception that using AI means that the machine is analyzing larger quantities of data. Rather, the machine may be able to spot patterns that would’ve […]

The Cybercrime Assembly Line

Light background with a graphic on the right side with three threat actors (one is rolling a large coin, the other is breaking into a computer, and another is interacting with login credentials. There is a dark yellow oval in the top left with the white text "Blog: and blue text below "The Cybercrime Assembly LIne."

Back in 2018, the Center for Strategic and International Studies came to the conclusion that cybercrime cost the world an approximate $600 billion annually, nearly 1% of global GDP. The cyber threat landscape has been constantly evolving, and the amount of money lost to cybercrime has only been increasing. According to IBM, the cost of […]