How do hackers use the dark web?

Logo
Presented by

Searchlight Cyber Threat Intelligence Engineer, Joe Honey

About this talk

There’s ‘no honour among thieves’, so how do cybercriminals monetize their illicit activities while evading detection from law enforcement on the dark web? Joe Honey, Threat Intelligence Engineer at Searchlight Cyber joins us to explain how hackers use the dark web, master their ‘craft’, and how security teams, can investigate and defend against the attacks from these threat actors. This video is part of the '12 Days of Dark Web FAQ' webinar series. Find all previous episodes here: https://series.brighttalk.com/series/7011?utm_source=SearchlightCyberUK&utm_medium=BrightTALK&utm_campaign=7011
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (24)
Subscribers (983)
Searchlight Cyber provides organizations with relevant and actionable dark web intelligence, to help them identify and prevent criminal activity. Founded in 2017 with a mission to stop criminals acting with impunity on the dark web, we have been involved in some of the world’s largest dark web investigations and have the most comprehensive dataset based on proprietary techniques and ground-breaking academic research. Today we help government and law enforcement, enterprises, and managed security services providers around the world to illuminate deep and dark web threats and prevent attacks.