Category: Dark Web Threats

records on the dark web represented by hackers with big hats and laptops in a cartoon style

Hackers Leaked 22 Million Records on the Dark Web in 2020

by Amelia Paro

Hackers leaked over 22 million records on the Dark Web in 2020, putting your business in danger of cyberattacks. Here's how to mitigate it.

Read More
facts about cybersecurity in 2020 and looking ahead to 2021 represented by an electronic eye on a blue background with computer code.

3 Big Facts About Cybersecurity in 2020 to Remember for 2021

by Matt Solomon

As you're making your 2021 cybersecurity plan, don't forget to consider these 3 essential facts about cybersecurity in 2020.

Read More
cyberpunk 2077 malware represented by a futuristic looking cityscape featuring many neon signs at night

Employees Bring Cyberpunk 2077 Malware Risk to Work

by Amelia Paro

Employees playing mobile games on work devices bring unexpected risks like Cyberpunk 2077 malware problem & more to businesses.

Read More
the FireEye breach and nation state hacking represented by a world map in blue-green.

3 Lessons Learned from the FireEye Breach

by Amelia Paro

Nation-state hackers ravaged cybersecurity giant FireEye this week. Here are 3 important lessons to learn from the FireEye breach.

Read More

2020 Election Cybersecurity Fears Boosted by New Hacked Voter Data in Dark Web Markets

by Kevin Lancaster

As election cyberattacks start to pile up, hacked voter data including 1.45 million records just hit the Dark Web, raising election security fears around cyberattacks.

Read More
DIY Dark Web monitoring danger represented by a hacker in a noodie hunched over a black computer in front of a glowing world map

5 Reasons Why You Can’t DIY Dark Web Monitoring

by Kevin Lancaster

Security awareness training , especially for phishing resistance, reduces cybersecurity incidents dramatically - if you maintain it properly. Here's how.

Read More
stolen data in the pot aty a dark web poker game represented by a computer keyboard with poker ships and cards on it.

Is Your Stolen Data in the Pot at a Poker Game?

by Kevin Lancaster

Cybercriminals are hungry for data like PII and password lists, because data is currency on the Dark Web, and used for everything from payments to poker games.

Read More
supply chain risk represented by a world map in blute digitized with pathways showing business relationships

10 Facts About Supply Chain Risk You Need to See

by ID Agent

You're paying attention to cybersecurity best practices but are your suppliers and service providers? Here's how to mitigate supply chain risk from sloppy third party cybersecurity dangers.

Read More
cybercrime as a service depicted as a hand on a mouse in a shadowy stream of information

10 Must-See Facts About the Danger of Cybercrime as a Service

by Kevin Lancaster

Cybercrime as a service is a growing industry, and a growing threat to businesses in a challenging economy. Here's one way to fight back.

Read More
2020 election cybersecurity fears and the biggest ransomware attacks of 2020 represented by the word ransomware on a red background with bitcoins and a lock

3 Lessons Learned from the Biggest Ransomware Attacks of 2020

by Kevin Lancaster

These 3 lessons from the biggest ransomware attacks of 2020 show businesses how to avoid common mistakes that make them vulnerable to attack.

Read More