Keep the dark web close and your cyber security tighter

被引:2
|
作者
Mador Z. [1 ]
机构
[1] Trustwave
来源
Computer Fraud and Security | 2021年 / 2021卷 / 01期
关键词
Beating heart - Criminal activities - Cyber security - Cybercrime - Dark web - Europol - Techniques and tools - Virtual marketplace;
D O I
10.1016/S1361-3723(21)00006-3
中图分类号
学科分类号
摘要
The dark web still offers a safe haven for criminal activity – especially those sites operating outside the reach of Western law enforcement. Much of the dark web is devoted to cybercrime, from sharing techniques and tools to selling stolen data and credentials. Having an ear to the ground in this shadowy underworld can give organisations an edge in identifying and defending against threats, from new trends to attacks specifically targeting them. But acquiring access to these secrets is no easy feat, explains Ziv Mador of Trustwave. “The golden age of the dark web marketplace is over”. So declared Europol in September 2020, after the triumphant announcement of operation ‘DisrupTOR’, a sting that led to the arrest of 179 criminals selling drugs and weapons.1 The operation, which saw co-ordination between Europol and law agencies across the world, is the latest strike against the virtual marketplaces that are the beating heart of the criminal underworld today. © 2021 Elsevier Ltd
引用
收藏
页码:6 / 8
页数:2
相关论文
共 50 条
  • [21] Heart Team 2.0: Keep your friends close ... and your enemy closer!
    Gaudino, Mario
    Crea, Filippo
    Massetti, Massimo
    Girardi, Leonard N.
    JOURNAL OF THORACIC AND CARDIOVASCULAR SURGERY, 2018, 155 (03): : 874 - 874
  • [22] The Dark Triad and Insider Threats in Cyber Security
    Maasberg, Michele
    Van Slyke, Craig
    Ellis, Selwyn
    Beebe, Nicole
    COMMUNICATIONS OF THE ACM, 2020, 63 (12) : 64 - 70
  • [23] "Cyber security is a dark art": The CISO as Soothsayer
    Da Silva J.
    Jensen R.B.
    Proceedings of the ACM on Human-Computer Interaction, 2022, 6
  • [24] Information Analysis and Cyber Crimes in Deep Web & Dark Web
    Akyildiz, Oguzhan
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 237 - 242
  • [25] Signs your cyber security is doomed to fail
    Chung M.
    Computer Fraud and Security, 2020, 2020 (03): : 10 - 13
  • [26] Keep spending: Beyond optimal cyber-security investment
    Zhang, Yunxiao
    Malacaria, Pasquale
    2023 IEEE 36TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF, 2023, : 123 - 136
  • [27] KEEP YOUR GUARD UP - CONTRACTED SECURITY SERVICE
    MUSGROVE, SW
    MUSEUM NEWS, 1989, 68 (01): : 68 - 69
  • [28] Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
    Hlavacek, Tomas
    Shulman, Haya
    Vogel, Niklas
    Waidner, Michael
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 4841 - 4858
  • [29] How to Keep Your Web Customers Coming Back
    Ellen Leanse
    Internet信息世界, 2000, (10) : 61 - 62
  • [30] Improving your company's cyber security training
    Taylor C.
    Network Security, 2023, 2023 (06)