Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "AlphaLock, Threat Actor Branding, and the World of Cybercrime Marketing" with a light orange arrow pointing down.

AlphaLock, Threat Actor Branding, and the World of Cybercrime Marketing

| | Blog, Resource Center
Threat actors are not a monolith in their approach to cybercrime. The popular perception is that threat actors steal information for the sake of it, while knowing and accepting that they are ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "LockBit's Conversation on XSS Forum with an Initial Access Broker" with a light orange arrow pointing down.

LockBit’s Conversation on XSS Forum with an Initial Access Broker

In February of 2024, admins of the Russian hacking forum XSS banned the primary LockBit account active on the forum. The ban was the result of a dispute between LockBit, and an ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Initial Access Broker Landscape in NATO Member States on Exploit Forum." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Initial Access Broker Landscape in NATO Member States on Exploit Forum

| | Blog, Dark Web Insider, Resource Center
Initial access brokers (IABs) gain unauthorized access to the system then sell this access to other malicious actors. Based on a large sample of IAB posts on the Russian-language hacking forum Exploit.in ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Modern Cyber Warfare: Crowdsourced DDoS Attacks." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Modern Cyber Warfare: Crowdsourced DDoS Attacks

| | Blog, Dark Web Insider, Resource Center
Over the past few years, politically motivated threat actors have increasingly gone online to find allies for their causes. While ten years ago most hactivism like this was anonymous, modern actors favoring ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Modern Cyber Warfare: Crowdsourced DDoS Attacks." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Modern Cyber Warfare: Crowdsourced DDoS Attacks

| | Blog, Dark Web Insider, Resource Center
Over the past few years, politically motivated threat actors have increasingly gone online to find allies for their causes. While ten years ago most hactivism like this was anonymous, modern actors favoring ...
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Initial Access Broker Landscape in NATO Member States on Exploit Forum." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Initial Access Broker Landscape in NATO Member States on Exploit Forum

| | Blog, Dark Web Insider, Resource Center
Initial access brokers (IABs) gain unauthorized access to the system then sell this access to other malicious actors. Based on a large sample of IAB posts on the Russian-language hacking forum Exploit.in ...

National Nonprofit Relies on Digital Resolve’s Authentication Technology

Learn why nonprofit organizations today are especially vulnerable to credit card fraud, and how Digital Resolve’s authentication technology stopped fraudulent transactions―before they were processed―for this national nonprofit. The post National Nonprofit Relies ...

IP Intelligence and the Digital Broadcast Revolution

Please login to gain access to this content. The post IP Intelligence and the Digital Broadcast Revolution appeared first on Digital Resolve ...

Small- and Mid-Sized Businesses Are Under Cyber Attack

Learn more about how multifactor authentication and SSO technologies can work together to protect your small- and mid-sized businesses from cyber attacks. The post Small- and Mid-Sized Businesses Are Under Cyber Attack ...
SMB Cybersecurity: Five Best Practices for Small Businesses

SMB Cybersecurity: Five Best Practices for Small Businesses

Digital Resolve CEO Bill Calpin shares five best practices small- and medium-sized businesses can use to protect data, devices, and networks, especially with so many people working from home. The post SMB ...