
- 76
- 16 147
Searchlight Cyber
United Kingdom
Приєднався 2 лис 2022
We provide organizations with relevant and actionable dark web threat intelligence to help them identify and prevent criminal activity. Founded in 2017 with a mission to stop criminals acting with impunity on the dark web, we have been involved in some of the world’s largest dark web investigations and have the most comprehensive dataset based on proprietary techniques and ground-breaking academic research. Today we help government and law enforcement, enterprises, and managed security services providers around the world to illuminate deep and dark web threats and prevent attacks.
Infostealers on the Dark Web
In this episode of The Dark Dive we're looking at a particular type of malware called Information Stealers or "infostealers". This malware is designed to (you guessed it!) steal information from infected devices.
Threat Intelligence Engineers Rob Fitzsimons and Joe Honey discuss exactly how infostealers work, why this malware has become so prolific, and where it can be spotted on the dark web.
During the episode we cover the differences between different strains of infostealer, recent law enforcement action that has succeeded in taking infostealers offline, and how organizations should be protecting themselves.
You can download Searchlight Cyber's infostealer report (discussed 26.53 - 29.40) here: slcyber.io/whitepapers-reports/infostealer-identified/
Find more information on Operation Magnus (discussed 38.18 - 47.06) here: www.operation-magnus.com/
Want to find out more or have a suggestion for future podcast episodes?
Email: thedarkdive@slcyber.io
Website: www.slcyber.io
LinkedIn: www.linkedin.com/company/searchlight-cyber
X: SLCyberSec
Weekly newsletter: www.slcyber.io/beacon/
Threat Intelligence Engineers Rob Fitzsimons and Joe Honey discuss exactly how infostealers work, why this malware has become so prolific, and where it can be spotted on the dark web.
During the episode we cover the differences between different strains of infostealer, recent law enforcement action that has succeeded in taking infostealers offline, and how organizations should be protecting themselves.
You can download Searchlight Cyber's infostealer report (discussed 26.53 - 29.40) here: slcyber.io/whitepapers-reports/infostealer-identified/
Find more information on Operation Magnus (discussed 38.18 - 47.06) here: www.operation-magnus.com/
Want to find out more or have a suggestion for future podcast episodes?
Email: thedarkdive@slcyber.io
Website: www.slcyber.io
LinkedIn: www.linkedin.com/company/searchlight-cyber
X: SLCyberSec
Weekly newsletter: www.slcyber.io/beacon/
Переглядів: 255
Відео
Elephant paths in cybersecurity - Identifying criminals talking about your business on the dark web
Переглядів 9Місяць тому
How do you discover employees taking IT and security shortcuts that may be making your organization vulnerable to a cyberattack? In this clip from our latest webinar, Founder of Talanos Cybersecurity, Andrew Papastefanou, discusses how using our dark web monitoring tool allowed his team to identify outgoing Tor traffic from a VPN an employee was using to watch Netflix. "You wouldn't have been a...
Encrypted Communication Apps: From Telegram to EncroChat
Переглядів 221Місяць тому
This episode of The Dark Dive focuses on encrypted communication apps, including Telegram, Tox, Signal, Session, and Jabber. While not strictly speaking part of the "dark web", these apps are used by the same criminals to perpetrate many of the same crimes. We start with the "mainstream", taking a close look at the popular messaging app Telegram in the wake of the arrest of its CEO in August 20...
Criminals using the dark web think you can’t see them - with Searchlight Cyber you can
Переглядів 20Місяць тому
Resolve risks faster - from day one. Searchlight’s #darkweb monitoring and investigation tools are ready to use in minutes - no software installation required. All actions are automatically prioritized based on dark web intelligence, so you can spend less time managing tools and more time protecting your organization. 🔸 Get prioritized alerts focused on your specific attack surface 🔸 Automatica...
Responding to a Cyberattack
Переглядів 2002 місяці тому
In this episode of The Dark Dive we're joined by incident response heavyweight Caleb Barlow (former head of IBM X-Force and now CEO of Cyberbit) and Searchlight Cyber's Head of Threat Intelligence Luke Donovan to discuss the best ways to respond to a cyberattack. Caleb and Luke share war stories, talk about what progress has been made in the cybersecurity industry (and areas of improvement!), a...
The Correlation Between Dark Web Exposure and Cybersecurity Risk
Переглядів 2823 місяці тому
Can you quantify the risk the dark web poses to organizations? In this episode of the podcast we discuss a landmark study that has tried to do just that. We're joined by Scott Stransky, Managing Director and Head of the Marsh McLennan Cyber Risk Intelligence Center and Ben Jones, CEO of Searchlight Cyber and Scott unravel the findings of the report "The Correlation Between Dark Web Exposure and...
Combating ransomware attacks with dark web intelligence
Переглядів 2565 місяців тому
In this webinar, we explore the evolving threat landscape in the first half of 2024, including an analysis of dark web data and the emergence of new ransomware groups in the wake of the disruption of Lockbit. 🟠 Watch the webinar in full: www.slcyber.io/webinars/ransomware-in-h1-2024-dark-web-trends-groups-insights/ 🟠 Learn how you can pre-empt and prevent cyberattacks with our award-winning dar...
Learning from past ransomware breaches
Переглядів 985 місяців тому
In this webinar, we explore the evolving threat landscape in the first half of 2024, including an analysis of dark web data and the emergence of new ransomware groups in the wake of the disruption of Lockbit. 🟠 Watch the webinar in full: www.slcyber.io/webinars/ransomware-in-h1-2024-dark-web-trends-groups-insights/ 🟠 Learn how you can pre-empt and prevent cyberattacks with our award-winning dar...
How has the ransomware environment changed in 2024 since 2023?
Переглядів 515 місяців тому
In this webinar, we explore the evolving threat landscape in the first half of 2024, including an analysis of dark web data and the emergence of new ransomware groups in the wake of the disruption of Lockbit. 🟠 Watch the webinar in full: www.slcyber.io/webinars/ransomware-in-h1-2024-dark-web-trends-groups-insights/ 🟠 Learn how you can pre-empt and prevent cyberattacks with our award-winning dar...
The Qilin Ransomware Group vs the National Health Service
Переглядів 2035 місяців тому
This episode of the podcast looks at the Qilin ransomware group's attack on the UK's National Health Service. Or - more accurately - their ransomware attack against Synnovis, a third party pathology testing organization for a number of London hospitals. Guests Louise Ferrett and Joe Honey go through time timeline of the attack - discussing the group's history, whether to trust claims that the a...
Dark Web Data Leaks
Переглядів 2506 місяців тому
This episode of The Dark Dive takes a listener's question as a jumping off point to talk about the topic of data leaked on the dark web. Guests Luke Donovan and Adam Wilson discuss a series of noteworthy cases of historic data leaks over the years - impacting organizations such as 23andMe, Ashley Madison, Yahoo! - and bring things right up to the present day (June 2024) by looking at the data l...
How dark web intelligence helps with incident response
Переглядів 426 місяців тому
Ever wondered what happens before and after a ransomware attack on your network? Watch our exclusive webinar with Dark Reading to discover the full picture with insights from the dark web. Historically, organizations could only gather intelligence on what a ransomware attacker did on their network - what came before and after was a mystery. However, the ability to gather intelligence from the d...
What are the challenges when it comes to ransomware
Переглядів 176 місяців тому
Ever wondered what happens before and after a ransomware attack on your network? Watch our exclusive webinar with Dark Reading to discover the full picture with insights from the dark web. Historically, organizations could only gather intelligence on what a ransomware attacker did on their network - what came before and after was a mystery. However, the ability to gather intelligence from the d...
Gaining visibility earlier in the kill chain
Переглядів 126 місяців тому
Ever wondered what happens before and after a ransomware attack on your network? Watch our exclusive webinar with Dark Reading to discover the full picture with insights from the dark web. Historically, organizations could only gather intelligence on what a ransomware attacker did on their network - what came before and after was a mystery. However, the ability to gather intelligence from the d...
Paying ransomware doesn’t mean it’s over
Переглядів 166 місяців тому
Paying ransomware doesn’t mean it’s over
The emotional impact of a ransomware attack
Переглядів 206 місяців тому
The emotional impact of a ransomware attack
The biggest challenges when it comes to #dfir (digital forensics and incident response)
Переглядів 247 місяців тому
The biggest challenges when it comes to #dfir (digital forensics and incident response)
Mistakes organizations are making when it comes to incident response
Переглядів 127 місяців тому
Mistakes organizations are making when it comes to incident response
The value of continuous dark web monitoring for incident response
Переглядів 197 місяців тому
The value of continuous dark web monitoring for incident response
How can you proactively investigate, pre empt, and prevent ransomware attacks?
Переглядів 178 місяців тому
How can you proactively investigate, pre empt, and prevent ransomware attacks?
What else should CISOs and compliance managers look out for as part of the new audit?
Переглядів 88 місяців тому
What else should CISOs and compliance managers look out for as part of the new audit?
What are the biggest changes to ISO 27001: 2022?
Переглядів 108 місяців тому
What are the biggest changes to ISO 27001: 2022?
The challenges of crawling and scraping the dark web for security teams
Переглядів 1639 місяців тому
The challenges of crawling and scraping the dark web for security teams
Customer story: Investigating Lockbit activity on an M&A transaction
Переглядів 269 місяців тому
Customer story: Investigating Lockbit activity on an M&A transaction
New #darkwebforums to watch: Raiding, Blackforums, and Onniforums
Переглядів 2079 місяців тому
New #darkwebforums to watch: Raiding, Blackforums, and Onniforums
How can security experts access stolen log files sold online?
Переглядів 209 місяців тому
How can security experts access stolen log files sold online?
Thank you so much for this amazing video! Could you help me with something unrelated: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How should I go about transferring them to Binance?
Before reddit cracked down I used to browse the Darknetmarkets and various other dark net subreddits. Another factor that applies to the markets not lasting is people who ran those would basically steal a bunch of bitcoin from the users somehow and close the market. I never used them so I'm not exactly sure how that was done. I remember this happening like 2 or 3 times though.
🔥🔥
Damnn🎉🎉
hallo, the good video, i apreciate you.
get a better mic. i ll be there bro
Just started poking around on the dweb. Some strange shit lmfao
Excellent podcast. Criminally under-viewed.
leave us alone
Anydesk
You’ll never take us down ARGGG!!!
I disagree. What protocols in i2p are less secure than tors? Also tor is circuit based (many nodes are compromised) and i2p is packet based. Also big difference in onion routing and garlic routing. Sounds like youre just saying a bunch of bull💩