Dark Web

Dark Web

Aug 162018

Cyber Black Market: What You Wouldn’t Think a Hacker Wants

| Senior Threat Intel Analyst

It is not difficult to understand the value of stolen bank accounts, credit cards, and social security numbers to cybercriminals. Each of those items are pieces of the average person’s financial life, and the fact that they can easily translate to profits in the hands of sellers on the cyber black market should come as […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Events

Aug 162018

Black Market LIVE! Dallas

admin Image

admin

Events

Jul 192018

Information Systems Security Administration Northern Virginia Meeting

admin Image

admin

Events

Jun 202018

Dallas Cloud Security Meetup

Rachel Chism Image

Rachel Chism

Apr 102018

Credit Card Skimming: Big Business for Data Thieves on the Dark Web

| Senior Threat Intel Analyst

What if I told you that for as little as $10, I could use your credit card without your knowledge or permission? Thanks to the Dark Web, I can. From track data dumps to cloned cards, the buyers and sellers on Dark Web forums are in the market for credit card information, and there are […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Apr 32018

Stolen PII & Ramifications: Identity Theft and Fraud on the Dark Web

| Senior Threat Intel Analyst

When the U.S. Department of Justice announced the seizure of AlphaBay last year, they closed a criminal marketplace on the Dark Web known to have trafficked in everything from illegal drugs to malware over the course of two years. At the time of the takedown, AlphaBay was home to more than 350,000 listings, many of […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Mar 272018

Cybercrime-as-a-Service: Selling DDoS on the Dark Web

| Senior Threat Intel Analyst

Unlike legitimate cybersecurity jobs, cybercrime does not require certification or advanced degrees. In fact, the barrier of entry into the world of cybercrime remains extremely low, in large part due to the growth of cybercrime-as-a-service on the Dark Web. In The Black Market Report, our Threat Resistance Unit (TRU) researchers identified a full menu of […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Events

Mar 222018

WEBINAR | Inside the Cyber Underworld: Armor’s Black Market Report

admin Image

admin

Mar 202018

Reselling Hospitality: A Look at Hotel Rewards on the Dark Web

| Senior Threat Intel Analyst

Just about any piece of data can be turned into money on the Dark Web – from social security numbers to utility bills to credit card information. Since everything is fair game, it should be no surprise that rewards points are just another piece of data on that list. Look inside The Black Market Report, […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Oct 42017

Pandora’s Box – The Convenience of Technology and the Price to Pay

We live in a culture of convenience. From drive-thru shopping to on-demand movies, we want everything at the quickest possible pace and with the least amount of effort. To those who are cynical, this simply means we are too lazy. To those with a “glass-half-full” view of the world, this quest for speed and low […]