The Top 3 Ways to Build a Threat Actor Profile
Threat actor profiling is a method that links the identity of actors using different identifiers. Learn more about building a threat actor profile here.
Threat actor profiling is a method that links the identity of actors using different identifiers. Learn more about building a threat actor profile here.
Businesses today must move beyond open web monitoring and include dark web monitoring to deliver digital risk management to their customers.
How Proactive Brand Monitoring Can Flag Suspicious Mentions — Before Disaster Strikes Key Facts: City Power, the utility provider responsible for providing Johannesburg, South Africa with electricity, recently suffered a devastating ransomware attack. The attack prevented customers from being able to view or pay electricity bills online. This resulted in some customers — particularly those...
How Webhose Uses Image Analysis and Recognition to Identify Illicit Content on the Dark Web Collecting data from the Dark Web is immensely more complex than it is in the open web. Since users want to remain anonymous and criminals often use their own jargon, it is far more difficult to navigate and track the...
Webhose’s New Data Leak Detection Helps Stop Data Breaches Before it’s Too Late We’re especially excited to announce that Webhose’s data service to detect breached data is now available to the public. Here in this post we’ll explain why we developed this application of our data service and how you can use it as either...
In recent years, it seems like not a day goes by without an announcement of a hack or data breach from a highly reputable company – whether Facebook, British Airways, or the Marriott. With the amount of data available online constantly expanding at a infinite rate lies a golden opportunity for hackers. Statistics have shown...
What Can We Expect on the Dark Web in 2019? From the data breach of major consumer brands like British Airways to huge social media sites like Quora and Facebook, 2018 showed us that it’s not a question of if, but when an organization will suffer a security breach. What’s more, the cost of data...
Major banks across Pakistan have suspended use of their debit cards and blocked international transactions after a report that data from a total of 19,000 debit cards were stolen in a cyber security breach. Debit card details have been published in two separate dumps on the Darknet for sale. That got us thinking. Can data...
Last week, between September 5-7, Webhose took part in the ISS World North America convention in Washington D.C. Hundreds of members among the leading national intelligence and cyber security agencies from over 20 countries participated. Topics such as data collection, criminal profiling, criminal anonymization and how to conduct crime investigations using the online resources at...
The Webhose.io team will remember February 13th 2017 primarily because of the opportunity to present at i-HLS Big Data alongside Fortune 500 leaders including IBM, SAP, and Dell. Over 500 participants convened to learn how homeland security and law enforcement agencies are using big data to serve and protect. Of particular interest was the role...