Tour of the Underground

Watch as Cyber Threat Intelligence Analyst Michael-Angelo Zummo shows you how to access the dark web and gives you a tour of the underground.

Watch Now

Extracting intelligence from the dark web

The dark web is a portion of the internet focused on privacy and anonymity, making it an ideal location for cybercriminals to share tools and information and offer their services for sale. This also makes dark web threat intelligence invaluable for companies as monitoring information posted on the dark web provides an uncensored view into the current cybercrime landscape and trends in cyberattacks.

Finding deep and dark web sources is no easy feat. The required knowledge of the exact URL is needed to access as these sources are not indexed.

From credit cards, data dumps, compromised endpoints, malicious programs, to the sale of narcotics, a whole lot of data is posted to these underground sources every minute of the day.

Watch as Cyber Threat Intelligence Analyst Michael-Angelo Zummo shows you how to access the dark web and gives you a tour of the underground.

Tour of the Underground Webinar thumbnail

What you'll learn

How to access the dark web

Types of underground sources

Extracting intel: manual vs paid intelligence

Recommendations to get ahead of threats and ways to protect yourself

Meet our speaker

Michael-Angelo Zummo headshot

Michael-Angelo Zummo

Cyber Threat Intelligence Specialist

Michael-Angelo Zummo is a Cyber Threat Intelligence Specialist at Cybersixgill. He is a US Marine Corps veteran that started his career as a cryptologic linguist and intelligence analyst. He served at the NSA (National Security Agency) where he supported national security efforts against foreign threats. Zummo earned his Masters in Cybercrime Investigations and Cybersecurity from Boston University, where he transitioned from national security to digital forensics, dark web intelligence, and law enforcement.

View on demand

Discover how Cybersixgill’s products can support your business

Contact our experts to discover which solutions are the best fit for your company

Book a demo

Recommended resources

Report

Refund fraud on the dark web

This report examines underground discourse of “refunding” TTPs, providing an overview of threat actors' most common refunding methods.

Read now
Ebook

Beyond the Headllines

You’ve read the headlines, now get the REAL story. Stay ahead with monthly analysis of the top cyber security stories, latest CVEs, and deep and dark web mentions.

Read now
Video

Emerging trends from the underground

In the first of our three part series, our panel discuss the most notable changes in threat actor behavior from the cybercriminal underground, analyzing the impact of these trends on security, vulnerability and GRC teams.

Watch now