Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Deep/Dark Web

Below you will find reports with the tag of “Deep/Dark Web”

image from Cyrptocurrency Gold Rush on the Dark Web

Cyrptocurrency Gold Rush on the Dark Web

From the report, “During the past six months, Carbon Black looked into the dark web to determine how cryptocurrency malware is being bought and sold, fostering a burgeoning economy designed to pilfer some of the most popular cryptocurrencies on the market.”

(more available)
Added: January 1, 2019
image from ERP Applications Under Fire

ERP Applications Under Fire

With hundreds of thousands of implementations across the globe, Enterprise Resource Planning (ERP) applications are supporting the most critical business processes for the biggest organizations in the world. This report is the result of joint research performed by Digital Shadows and Onapsis, aimed to provide insights into how the threat landscape has been evolving over time for ERP applications. We have concentrated our efforts on the two most widely-adopted solutions across the large enterprise segment, SAP and Oracle E-Business Suite, focusing on the risks and threats organizations should care about.

(more available)
Added: December 14, 2018
image from Seize and Desist?

Seize and Desist?

When law enforcement announced the seizure of AlphaBay in July 2017, the United States Attorney General Jeff Sessions described the operation as: “one of the most important criminal investigations of the year…because of this operation, the American people are safer – safer from the threat of identity fraud and malware, and safer from deadly drugs.” 1 The timing and coordination of the law enforcement operation, known as Operation Bayonet, was a clear success and has contributed to multiple subsequent arrests.2 Almost one year later, the marketplace model appears to be in decline, but the risks to businesses and consumers have not subsided. Instead, this paper demonstrates that cybercriminals have taken to incorporating new processes, technologies, and communication methods to continue their activities.

(more available)
Added: December 5, 2018
image from Patrolling the Dark Net: What You Don't Know Will Hurt You

Patrolling the Dark Net: What You Don't Know Will Hurt You

This e-book provides good insight into understanding cyber crime.

Added: December 5, 2018
image from Advice From The Board: All Companies Should Require Digital Risk Management to Mitigate Corporate Risk

Advice From The Board: All Companies Should Require Digital Risk Management to Mitigate Corporate Risk

The current environment for doing business forces business leaders to face an expanding attack surface, more sophisticated threats and threat actors, and mounting regulatory compliance. These factors are creating a perfect storm that puts your organization and your customers at risk. Now is the time to act. As a Board member or executive, it is not only your goal, but your responsibility to shareholders to protect their interests. The threat to your bottom line from a single incident are significant but a digital risk management strategy can help.

(more available)
Added: December 5, 2018
image from Executive Guide To Mobile Banking Trojans

Executive Guide To Mobile Banking Trojans

This report offers a helpful look at Mobile Banking Trojans.

Added: December 4, 2018
image from Quarterly Incident Response Threat Report: Destructive Cyberattacks Increase Ahead of 2018 Midterm Elections

Quarterly Incident Response Threat Report: Destructive Cyberattacks Increase Ahead of 2018 Midterm Elections

A trade war with China. A fragile agreement with North Korea. A growing fear of Russian hackers. Ahead of the 2018 U.S. midterm congressional elections, geopolitical conflict continues to play out in cyberspace.

(more available)
Added: November 21, 2018
image from APT29 Domain Fronting With TOR

APT29 Domain Fronting With TOR

This blog post takes a look at APT29 Domain Fronting with Tor.

Added: November 15, 2018
image from Avast Data Protection Report 2017

Avast Data Protection Report 2017

This simple little report takes a look at a survey conducted among 11,417 Avast users worldwide, Avast gauged people’s views regarding the value of their data stored in online accounts like email, shopping and social networking sites, and their habits when it comes to protecting their data. The results show that, while many respondents view their data as having actual financial value, they aren’t taking proper measures when affected by a data breach.

(more available)
Added: October 25, 2018
image from Targeted Brand Attacks and Mass Credential Exposures

Targeted Brand Attacks and Mass Credential Exposures

This report helps detail the importance of monitoring suspicious domain registrations to protect a brand from being destroyed by cyber criminals.

(more available)
Added: October 25, 2018
image from Behind The Curtain: The Illicit Trade Of Firearms, Ammunition, And Explosives On The Dark Web

Behind The Curtain: The Illicit Trade Of Firearms, Ammunition, And Explosives On The Dark Web

While the use of the dark web as facilitators for illicit drug trade has increasingly been the subject of research by a number of academics, little has been done to conduct a systematic investigation of the role of the dark web in relation to the illegal arms trade, drawing on the insights offered by primary data. To address this gap, and with a view to support- ing policy and decision makers, RAND Europe and the University of Manchester designed this research project.

(more available)
Added: October 24, 2018
image from Balancing Humans And Machines

Balancing Humans And Machines

Aaron Higbee, Co-founder and CTO, PhishMe, (now CoFense) discusses the future of phishing defence and asks which side of the fence the future of defence against phishing attacks lies: human or machine?

(more available)
Added: October 23, 2018
image from Credential Compromise: What You Need To Know About Theft, Stuffing, And Spilling, And What You Can Do About It

Credential Compromise: What You Need To Know About Theft, Stuffing, And Spilling, And What You Can Do About It

This paper seeks to help mitigate serious crimes related to mobile security and credential fraud.

Added: October 22, 2018
image from The Darknet Index: 2018 Black Hat Edition

The Darknet Index: 2018 Black Hat Edition

Notable declines in darknet exposure among black hat exhibitors, but does a risky darkint score correlate to share price performance?

(more available)
Added: October 21, 2018
image from Internet-Facilitated Drugs Trade: Analysis Of The size, scope, and the role of the Netherlands

Internet-Facilitated Drugs Trade: Analysis Of The size, scope, and the role of the Netherlands

This report aims to investigate the role of the Internet in facilitating drugs trade. It is commissioned by the Research and Documentation Centre (Wetenschappelijk Onderzoek- en Documentatiecentrum, WODC), the independent research arm of the Ministry of Security and Justice in the Netherlands. Special attention will therefore be paid to the role of Dutch actors in facilitating this trade.

(more available)
Added: October 20, 2018
image from The Ransomware Economy

The Ransomware Economy

This paper discusses the How and Why the Dark Web Marketplace for Ransomware Is Growing at a Rate of More Than 2,500% Per Year

(more available)
Added: October 20, 2018
image from 2017 Credential Spill Report

2017 Credential Spill Report

Shap Security has a unique position to talk about credtial spills. This paper provides a breakdown of their experiences with the credential spill issues of 2017.

(more available)
Added: October 19, 2018
image from Into The Web Of Profit

Into The Web Of Profit

This book provides excellent research and an in-depth study of cybercrime criminals and money.

Added: October 18, 2018
image from Making Threat Intelligence Actionable

Making Threat Intelligence Actionable

From the report, “AED is an acronym we‘ve coined, short for “Acquire, Enrich, Detect.” It describes the process we use internally to collect threat intelligence and actualize our ability to identify when networks are under attack. We do this in the shortest possible time, with the highest degree of confidence, by looking ONLY at the raw network traffic.”

(more available)
Added: October 18, 2018
image from Digital Souks: Middle Eastern and North African Underground

Digital Souks: Middle Eastern and North African Underground

Trend Micro researchers’ in-depth explorations of the cybercriminal underworld— from Germany1, Brazil2, Japan3, North America4, and China5 to Russia6—have shown how financial gain motivates the way malware, crimeware, personally identifiable information (PII), and stolen commodities change hands. While their marketplaces are profit-driven and focused on flaunting their wares, we observed that the Middle Eastern and North African (MENA) underground was somewhat different with its ironic mix of ideology and felony.

(more available)
Added: October 17, 2018
image from ERP Applications Under Fire: How CyberAttackers Target The Crown Jewels

ERP Applications Under Fire: How CyberAttackers Target The Crown Jewels

This report is the result of joint research performed by Digital Shadows and Onapsis, aimed to provide insights into how the threat landscape has been evolving over time for ERP applications.

(more available)
Added: October 16, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)