
Sign up to save your podcasts
Or
Dark Markets are making cybercrime more accessible than ever. Malware, remote access tools, phishing kits, credit cards information: all of it is readily available, and oftentimes available as a service, if you just know where to look. Subscribing to these illicit services is now as easy as signing up for Disney+.
In this Deep Dive, host Rob Maas and special guest, cybersecurity researcher Michele Campobasso, discuss dark markets, and the rise of cybercrime-as-a-service.
Key questions answered in this Deep Dive:
🕶️ What are dark markets, and how do they work?
🔑 How do cybercriminals (or intrepid researchers) access these dark markets?
🎬 How is cybercrime becoming as accessible as a streaming service?
⚠️ What risks do businesses face from dark markets?
🔎 What role does threat intelligence plays in monitoring these markets?
With cybercrime as easy to access as a Netflix subscription, Rob and Michele explore how these underground marketplaces operate, how they’re changing the threat landscape, and what organizations can do to protect themselves.
Dark Markets are making cybercrime more accessible than ever. Malware, remote access tools, phishing kits, credit cards information: all of it is readily available, and oftentimes available as a service, if you just know where to look. Subscribing to these illicit services is now as easy as signing up for Disney+.
In this Deep Dive, host Rob Maas and special guest, cybersecurity researcher Michele Campobasso, discuss dark markets, and the rise of cybercrime-as-a-service.
Key questions answered in this Deep Dive:
🕶️ What are dark markets, and how do they work?
🔑 How do cybercriminals (or intrepid researchers) access these dark markets?
🎬 How is cybercrime becoming as accessible as a streaming service?
⚠️ What risks do businesses face from dark markets?
🔎 What role does threat intelligence plays in monitoring these markets?
With cybercrime as easy to access as a Netflix subscription, Rob and Michele explore how these underground marketplaces operate, how they’re changing the threat landscape, and what organizations can do to protect themselves.