Trends from the Underground H1 2023 MSSP Edition

Discover the crucial insights that could safeguard your clients against the rising tide of cyber threats in the second half of 2023. Our report takes a deep dive into the activities of threat actors worldwide, shedding light on the escalating ransomware attacks and vulnerability exposures that continue to plague the digital landscape.

Download Now

This report provides a comprehensive review of threat actor activities worldwide in the first half of 2023. It highlights the alarming rise in ransomware attacks and vulnerability exposures, along with unexpected changes in compromised credit card trends. The dominance of Generative AI solutions in the cyber domain is explored, as both threat actors and defenders rush to integrate AI capabilities into their strategies for the ongoing cyber arms race.

Trends from the Underground H1 '23 MSSP

The key trends discussed in this report are:

A change in direction for credit card fraud

Initial access broker market movements

Ransomware attack trends including the ransomware groups dominating our headlines in 2023

Vulnerability exposure trends including the top 10 vulnerabilities of 2023

Dark web forums vs. encrypted messaging apps

Download the Report

It will be sent to your e-mail!

How can Cybersixgill’s products can help your business?

Contact our experts to discover which solutions are best for your company

Book a demo

Recommended resources

Podcast

Cybercriminal Communities Russia and China

In this episode of "Defense Against the Dark Web," host Delilah Schwartz deep-dives into the dynamic cyber threat landscape with Chinese and Russian cybersecurity expert Naomi Yusupov.

Listen now
Webinar

4 Threat Intelligence Time Saving Tips

Unleash the Power of Cybersixgill: Join our webinar to supercharge your cyber threat intelligence investigations and reporting.

Watch now
Video

Vulnerability Exploit Intelligence Product Tour

In less than 5minutes, our experts will demonstrate how Vulnerability Exploit Intelligence from the clear, deep and dark web can be deployed to quickly find, measure, prioritize and remediate the risk of vulnerabilities to your organization.

Watch now