
Sign up to save your podcasts
Or
What does it really take to expose the criminal underworld operating in the hidden corners of the internet? In this episode, I sit down with Dr. Gareth Owenson, Co-Founder and CTO of Searchlight Cyber, to uncover what’s really happening on the dark web and how organizations can take action before threats escalate.
Gareth has spent more than a decade researching the Tor network and advising governments, law enforcement, and the military on how to track criminal activity online. His work has moved from academia into frontline cybersecurity operations, leading to major breakthroughs including the takedown of a hacker group targeting a national government.
We explore what makes the dark web attractive to criminal networks, how threat actors are evolving, and what defenders can do with early signals from hidden forums, marketplaces, and anonymized networks. Gareth explains how criminals are using Tor to traffic malware, trade stolen data, and build ransomware businesses, and why many organizations still overlook this part of the internet.
Gareth also shares how Searchlight Cyber uses proprietary tools and research to monitor the deep and dark web, turning obscure activity into actionable intelligence for security teams and law enforcement.
If you're responsible for protecting digital infrastructure and you're not factoring in the dark web, you're missing critical context. So how do you turn unseen risks into visible signals before they become full-blown attacks? Let’s find out.
5
198198 ratings
What does it really take to expose the criminal underworld operating in the hidden corners of the internet? In this episode, I sit down with Dr. Gareth Owenson, Co-Founder and CTO of Searchlight Cyber, to uncover what’s really happening on the dark web and how organizations can take action before threats escalate.
Gareth has spent more than a decade researching the Tor network and advising governments, law enforcement, and the military on how to track criminal activity online. His work has moved from academia into frontline cybersecurity operations, leading to major breakthroughs including the takedown of a hacker group targeting a national government.
We explore what makes the dark web attractive to criminal networks, how threat actors are evolving, and what defenders can do with early signals from hidden forums, marketplaces, and anonymized networks. Gareth explains how criminals are using Tor to traffic malware, trade stolen data, and build ransomware businesses, and why many organizations still overlook this part of the internet.
Gareth also shares how Searchlight Cyber uses proprietary tools and research to monitor the deep and dark web, turning obscure activity into actionable intelligence for security teams and law enforcement.
If you're responsible for protecting digital infrastructure and you're not factoring in the dark web, you're missing critical context. So how do you turn unseen risks into visible signals before they become full-blown attacks? Let’s find out.
1,639 Listeners
1,272 Listeners
1,023 Listeners
513 Listeners
625 Listeners
173 Listeners
202 Listeners
2,299 Listeners
296 Listeners
323 Listeners
266 Listeners
189 Listeners
5,282 Listeners
343 Listeners
143 Listeners