Cybersecurity Awareness Month: Upcoming Content

October 02, 2024

In light of Cybersecurity Awareness month, DarkOwl is committed to sharing research, trends and industry news from our analysts.

Be the first to know as we release new research by entering your email below!

Upcoming Content This Month

REPORT

Election Disinformation

In the lead-up to the upcoming U.S. presidential election, the disinformation landscape is becoming increasingly complex. DarkOwl analysts have delved into how mis- and disinformation originating from the dark web, and alternative online spaces, is infiltrating mainstream platforms. Various actors, including nation states, U.S.-based political movements, and conspiracy groups, are shaping this online space. Their activities have led to false narratives moving between the deep, dark web and more widely accessible platforms.

As major social media companies struggle with regulating disinformation, narratives once confined to niche spaces are now gaining broader traction. This underscores the importance of recognizing and addressing the growing influence of disinformation as the election approaches. Stay tuned for the full report and sign up for emails to get this report directly delivered to your inbox upon publication. Read full report.

BLOG

What are Drainers as a Service?

In this blog series, we aim to explain and simplify some of the most commonly used terms. Previously, we have covered bullet proof hostingCVEsAPIs, and brute force attacks. In this edition, let’s dive into Drainer as a Service.

Drainers as a Service (DaaS) is a disturbing evolution that makes sophisticated financial fraud accessible to even low-skill criminals. In this blog, we’ll explore what DaaS is, how it works, and why it’s becoming a growing concern in the cybersecurity world. Check it out.

BLOG

The Rising Tide of Phishing: Exploring Emerging Threats Beyond Email

In the early days of phishing attacks, bad actors simply used emails with malicious links to lure their victims into exposing their credentials. Although this is still very prevalent, these techniques are quickly evolving as threat actors adopt adjacent styles of phishing, like voice phishing (vishing), SMS phishing (smishing), QR code phishing (Quishing), deepfake phishing (AI phishing), and more. It’s important to understand how these attacks are evolving and how threat actors are adjusting their approach to increase the likelihood of success. Read here.

EVENT

DarkOwl @ OsmosisCon in Las Vegas, NV

Attending OSMOSIScon conference? The open source skills-building conference’s mission is to educate and train cyber intelligence investigators, researchers, reporters, and analysts on OSINT and SOCMINT techniques and best practices. Stop by Table 17 and schedule time to meet with us in-person here.

BLOG

Q3 Product Updates

Stay tuned for our quarterly update blog highlighting new product features and collection stats updates. There is always something exciting coming from our Product and Collections teams and the team is excited to share this round of updates! Check it out!

EVENT

it-sa Expo&Congress in Nuremberg, Germany

Going to be at it-sa, Europe’s largest trade fair for IT security…and one of the most important dialogue platforms for IT security solutions? Make sure to schedule time to meet us and see us at Booth 7A-632 during the show.

Election Disinformation

In this webinar, DarkOwl analysts explore the disinformation landscape on the dark web in the context of the upcoming U.S. presidential election. What emerges is a complex, multifaceted online space characterized by a variety of actors, ranging from nation states to American citizens and U.S.-based conspiratorial political movements. All of the above play key roles in both creating and amplifying mis- and disinformation which has seeped from the deep and dark web onto the surface web, and vice versa. As a number of prominent social media platforms maintain policies of limited disinformation regulation, false narratives previously concentrated on the dark web and alternative social media platforms have become mainstream, thereby gaining traction and reaching greater audiences. Combined, these factors reflect a complex environment in the lead up to the election, and highlight the importance of identifying and combatting mis- and disinformation. Recording and transcription here.

BLOG

Cyber Actor Spotlight: Terrorgram

The dark web community of those buying, selling, trading and sharing data is extremely active. Dark web sites such as BreachForums and LeakBase are heavily used by threat actors to trade data, ask about what is available and provide links to stolen data. However, some individuals in this community are more active than others, regularly sharing data leaks from high profile organizations, often claiming they have hacked the data themselves or worked with other hackers to make the data available.  

One such threat actor is known as USDoD. He has been very active on BreachForums, sharing multiple leaks and also claiming to be starting his own site to share data. However, it was reported late last week that he had been arrested in Brazil. Here we will review some of USDoD’s activities and what lead to his arrest. Full blog here.

BLOG

Exploring the Darknet: A Halloween Journey

The darknet can be a scary place. 👻 For Halloween, we will highlight some spooky findings from our analyst team that they have come across this past year. In the meantime, check out last year’s edition where the team uncovered human organs for sale, human meat for sale, and hitmen for hire! Check out this years’ blog here.


Curious to see how darknet data can improve your cybersecurity situational awareness? Contact us.

See why DarkOwl is the Leader in Darknet Data

Copyright © 2024 DarkOwl, LLC All rights reserved.
Privacy Policy
DarkOwl is a Denver-based company that provides the world’s largest index of darknet content and the tools to efficiently find leaked or otherwise compromised sensitive data. We shorten the timeframe to detection of compromised data on the darknet, empowering organizations to swiftly detect security gaps and mitigate damage prior to misuse of their data.