• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   deepweb

The Boys are Back in Town: Deep Web Marketplaces Back Online

  • Posted on:November 8, 2013 at 12:21 pm
  • Posted in:Bad Sites
  • Author:
    Vincenzo Ciancaglini (Senior Threat Researcher)
0

While Ross Ulbricht, the accused operator of the first Silk Road Marketplace, remains in trial in New York, a new version of the deep web site, named Silk Road 2.0, has been launched yesterday. The launch was announced through the Twitter account of Dread Pirate Roberts, the pseudonym Ulbricht allegedly used while operating the site. Figure…

Read More
Tags: Deep Webdeepwebsilk roadTor

Cybercrime in the Deep Web

  • Posted on:October 4, 2013 at 6:11 am
  • Posted in:Bad Sites
  • Author:
    Robert McArdle (Senior Threat Researcher)
0

Earlier, we published a blog post talking about the recent shut down of the Silk Road marketplace. There, we promised to release a new white paper looking at cybercrime activity on the Deep Web in more detail. This paper can now be found on our site here. While the Deep Web has often been uniquely associated…

Read More
Tags: Deep WebdeepwebRussian undergroundsilk roadunderground

Deep Web and Cybercrime – It Is Not Just the Silk Road

  • Posted on:October 3, 2013 at 7:10 am
  • Posted in:Bad Sites
  • Author:
    Robert McArdle (Senior Threat Researcher)
0

The infamous Silk Road marketplace is probably the most well-known place online for anyone wanting to purchase all sorts of illegal goods – ranging from illicit drugs, to firearms and all the way up to hitmen-for-hire. Yesterday, after two and half years in operation, the site was shut down by the FBI and its owner…

Read More
Tags: arrestsDeep WebdeepwebFBIsilk roadTor

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.