Trends from the Underground H1 2023

Now that we’ve entered the second half of 2023, it’s time to look back at what threat actors have been up to in the dark corners of cyberspace.

Watch Now

Join us for a webinar where we take a deep dive into the findings and data from our latest underground observations so that you can make informed decisions about your cybersecurity strategy. In this webinar, we’ll delve into the trends we've observed across the cybercriminal underground, including compromised credit cards, ransomware attacks, initial access broker markets, and more, and discuss the critical importance of context-rich threat intelligence.

Trends Webinar-Thumbnail

Key Topics Covered:

A change in direction for credit card fraud

Initial access broker market movements

Ransomware attack trends including the ransomware groups dominating our headlines in 2023

Vulnerability exposure trends including the top 10 vulnerabilities of 2023

Dark web forums vs. encrypted messaging apps

Meet our speaker

Delilah Schwartz

Delilah Schwartz

Security Strategist

Delilah Schwartz boasts a unique blend of expertise in the fields of extremism, internet-enabled radicalization and the cybercriminal underground. Leveraging her extensive multidisciplinary knowledge and research analysis skills, Delilah brings a unique perspective to the cybersecurity industry, providing valuable insights into the complex and rapidly evolving threat landscape. Delilah is passionate about democratizing cybersecurity discourse, and making ‘cyber speak’ accessible to a non-technical audience.

Get access to the video

It will be sent to your e-mail!

How can Cybersixgill’s products help your business?

Contact our experts to discover which solutions are best for your company

Book a demo

Recommended resources

Cybersecurity in Focus: Manufacturing

Cybersecurity in Focus: Manufacturing

Get ahead of cyber threats targeting the manufacturing sector with our latest ebook.

Read now
Harnessing Risk Intelligence to Achieve Enforceable Security and Compliance

Harnessing Risk Intelligence to Achieve Enforceable Security and Compliance

Apply contextual risk-based threat intelligence to enhance data security, compliance, and regulatory adherence, minimizing cybersecurity threats and assessing business risk.

Watch now
Broken Chains: Understanding Third-Party Cyber Threats

Broken Chains: Understanding Third-Party Cyber Threats

Discover the nature and impact of supply chain attacks, emphasizing proactive measures for risk mitigation and enhancing supply chain security and resilience.

Read now