Hi [[ session.user.profile.firstName ]]

Fortnite and the Dark Web: How an illicit industry developed around this game

Gaming and criminality have gone hand in hand for centuries. From cheating in games of chance, through laundering money in cash-rich casinos, to grey market shark-lending, the gaming industry has historically been a hotbed of criminal activity.

It is no surprise then that digital gaming, an industry that grossed over $100 billion in 2017, has also attracted the criminal underclass.

Join us to learn how Fortnite, a game with over 125 million active players and revenues of hundreds of millions of dollars every month, has become a focal point for criminal activity in the deep and dark web.
Recorded Nov 7 2018 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Benjamin Preminger
Presentation preview: Fortnite and the Dark Web: How an illicit industry developed around this game

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Maximize Cortex XSOAR’s performance with Sixgill’s Darkfeed Jun 3 2020 3:00 pm UTC 45 mins
    Pramukh Ganeshamurthy (Palto Alto Networks) & Dov Lerner (Sixgill)
    Please join us to explore how Sixgill and Cortex XSOAR (previously Demisto) are enabling customers to scale and accelerate their incident prevention and response by combining deep and dark web intelligence with automation. Building simple, automated & effective cyber security, and executing it to the fullest extent, is critical in order to get the best outcomes and maximize business impact.

    Learn how combined Cortex XSOAR and Darkfeed can:
    - Automatically integrate and a rich data stream of industry-related indicators of compromise (IOCs) from closed-access sources in the cyber underground
    -Receive automated early warnings of new threats before they are deployed in the wild
    -Hunt for malicious IOCs on corporate networks from a single dashboard
  • YOU Are the Product: Combating the Identity Takeover Marketplace Recorded: Apr 22 2020 60 mins
    Benji Preminger & Gabi Taubes
    A Joint Forter-Sixgill Webinar:

    There is a flourishing online marketplace where your account information, email credentials, and personal details are being sold for just a few cents per piece. The dark web provides fraudsters with intelligence that enables them to infiltrate your accounts without raising any suspicions - and do with it as they please. This elaborate and competitive online marketplace is a major force behind the increasing sophistication of account takeovers (ATOs) that the market has witnessed over the last three years.

    Join us on Wednesday, April 22nd at 1pm ET, as leading analysts Gabi Taubes, Fraud Analyst Team Leader at Forter, and Benji Preminger, Product Manager at SixGill, reveal insights and details about how fraudsters are leveraging the dark web marketplaces and the processes by which online criminals are monetizing these types of attacks.

    In this webinar you will learn:

    -How online marketplaces are offering even more tools (like monetization and localization data) to help fraudsters improve their attacks.

    -Why legacy fraud tools cannot detect sophisticated methods of attacks like ATO.

    -How merchants and consumers can better protect their personal data from would-be fraudsters.
  • 1-2-1 Interview - SIXGILL, Cybertech Tel Aviv 2020 Recorded: Jan 29 2020 7 mins
    Benjamin Preminger, Product Manager
    SIXGILL, Cybertech Tel Aviv 2020
    1-2-1 Interview - Benjamin Preminger, Product Manager
  • Mobile Banking Malware Recorded: Jan 27 2020 25 mins
    Edan Cohen
    As people are constantly depending on their cell phones, cybercriminals have also focused their efforts and mobile banking malware has increasingly become a threat. In this webinar, Edan Cohen will discuss the two main types of mobile banking malware, mobile banking trojans and rogue banking applications, and also talk about how their capabilities can extend far beyond just stealing your banking credentials.
  • Sniffing in the Dark: Credit Card Sniffers on the Dark Web Recorded: Dec 10 2019 44 mins
    Dov Lerner, Threat Intelligence Researcher, Sixgill
    Credit card sniffers are malicious scripts that are injected onto payment pages of e-commerce sites and scrape customer payment information, including credit card data. They have been identified as the highest-impact threat to the retail sector, accounting for 88 significant breaches in 2018, including the Magecart attack against British Airways.

    In this webinar, Dov Lerner will discuss discourse on the dark web surrounding credit card sniffers, and what this teaches us about the broader cybercrime enterprise.
  • OPISIS and the Modern Age of Cyber Warfare Recorded: Nov 4 2019 43 mins
    Benji Preminger
    The fight against ISIS -the Islamic State - may have been decided in Syria, but in cyberspace it rages on.
  • How to Solve Your Vulnerability Challenge 100x Faster Recorded: Oct 7 2019 30 mins
    Omer Carmi, VP Intelligence - Sixgill
    Organisations have too much information in their hands, and not enough contextual intelligence to act upon. Omer Carmi, VP Intelligence, Sixgill will explain how machine learning, automation and valuable information from the dark and deep web can finally solve this acute problem from a new angle.
  • Sixgill TV: Sixgill's New Dynamic CVE Scoring Feature Recorded: Oct 3 2019 3 mins
    Barry Spielman
    Sixgill VP Marketing, Barry Spielman discusses Sixgill's new CVE Dynamic scoring feature
  • Highlights from Gartner's 2019 Cyber Summit Recorded: Jul 14 2019 3 mins
    Barry Spielman
    Sixgill VP Marketing, Barry Spielman, discusses some of the highlights of the June 2019 Gartner Cyber Summit in National Harbor, MD and Gartner naming Sixgill a Cool Vendor in its May 2019 Report on Security Operations and Threat Intelligence.
  • Compromised Credentials: The Cyber Underbelly of Global Corporations Recorded: May 21 2019 50 mins
    Benjy Preminger
    In late 2018 we saw the release of a massive amount of leaked credentials "dumps". These expertly-curated collections highlight the risk posed by credentials leaked from large organizations. Join this webinar to understand how even most novice threat actors have the access and ability to exploit billions of sensitive corporate credentials, and how this threat affects your organization.
  • Off-The-Shelf Hacking Products Recorded: Mar 26 2019 52 mins
    Gilad Israeli
    Cyber threat actors find a seemingly limitless supply of hacking tools and products in deep and dark web markets and forums. How far can an attacker go with a ready-made hacking tool that was bought on the dark web? Where would the attacker be from? And what are the most popular off-shelf hacking product these days?
  • The Global Cybercrime Industry – A Holistic View Recorded: Feb 20 2019 58 mins
    Gabriel Glusman
    The cybercriminal economy is based on a global illicit industry that, although unregulated, has well defined regions, suppliers, distributors, consumers, innovators, and end-users.

    Join us for a qualitative view of cybercriminal hubs around the world - differentiating cultural and environmental factors, motivations, and what place each occupies in the cybercrime supply chain.
  • How Cybercriminals Stay Anonymous Recorded: Jan 23 2019 48 mins
    Alex Karlinsky
    Cybercriminals always strive to stay ahead of the curve. In this webinar, Alex Karlinsky will shed some light on the latest techniques they employ to stay under the radar of cyber security firms and law enforcement agencies.
  • Your Identity on the Dark Web: How Much is it Worth to Criminals? Recorded: Dec 19 2018 54 mins
    Noam Kehati
    What pieces of your personal information are most valuable in the underground and how is the data leveraged for financial gain? What can you do to protect yourself? The answers to these questions may surprise you
  • Fortnite and the Dark Web: How an illicit industry developed around this game Recorded: Nov 7 2018 41 mins
    Benjamin Preminger
    Gaming and criminality have gone hand in hand for centuries. From cheating in games of chance, through laundering money in cash-rich casinos, to grey market shark-lending, the gaming industry has historically been a hotbed of criminal activity.

    It is no surprise then that digital gaming, an industry that grossed over $100 billion in 2017, has also attracted the criminal underclass.

    Join us to learn how Fortnite, a game with over 125 million active players and revenues of hundreds of millions of dollars every month, has become a focal point for criminal activity in the deep and dark web.
  • Crypto-Wallet Cyber-Attack Alert: Hackers Are Coming Recorded: Oct 3 2018 47 mins
    Gilad Israeli
    How could a smart cyber-threat intelligence prevent the hacking of a web-based crypto wallet that ended in a massive robbery of millions of dollars? Sixgill senior intelligence analyst Gilad Israeli looks at asset-based intelligence and its capability to lead to a cyber-attack prevention. As an example, Gilad will discuss how Sixgill exposed a cyber-attack prior to its execution and proved the capability of providing actionable intelligence.
  • Data Trading in the Darknet: What Types of Information are being Sold, and Why Recorded: Sep 17 2018 55 mins
    Gabriel Glusman
    Cybercriminals are constantly on the prowl, and personal and corporate data is their favorite catch. Confidential information is being traded in darknet underground markets at any moment, even years after being compromised. Learn about the different ways in which the data is stolen, how cyber crooks monetize it, and steps you can take to be better protected.
  • Dark web cyber attacks analysis with Avi Kasztan, Sixgill CEO Recorded: Aug 1 2018 8 mins
    Pentester Academy
    CEO and Co-Founder Avi Kasztan tells us why he launched Sixgill after seeing the continued growth of attacks stemming from the dark web. He discusses Threat Actor Analysis and automatic, real-time dark web monitoring.
  • Sixgill's Dark-I Threat Intel Platform - Pentester Academy Interview Recorded: Jul 1 2018 21 mins
    Pentester Academy
    The Senior Cyber Intelligence Analyst at Sixgill, Gabriel Glusman, gives us a breakdown on the dark web vs the deep web and why the social media-like community on the dark web enables cyber attacks to thrive. Glusman then goes on to discuss the technology behind Dark-i and how it analyzes dark web activity to proactively combat cyber attacks.
  • Demystifying the Dark Web: Why Threat Intel from Anonymous Networks is Critical Recorded: Feb 20 2018 49 mins
    Josh Zelonis, Senior Analyst Serving Security & Risk Professionals , Forrester; Avi Kasztan, CEO and Co-Founder, Sixgill
    Threat intelligence is a critical factor in defending increasingly complex environments from sophisticated attacks. Join Sixgill and Forrester guest speaker Josh Zelonis for a fireside chat where we’ll explore how attackers are leveraging the deep and dark web, and how your organization can benefit from this type of intelligence.
Sixgill: Your Eyes in the Dark Web
Sixgill is a cyber threat intelligence company that covertly and automatically analyzes Deep and Dark Web activity helping to detect and prevent cyber-attacks and sensitive data leaks before they occur. Utilizing advanced algorithms, Sixgill’s cyber intelligence platform provides organizations with continuous monitoring, prioritized real time alerts and actionable intelligence

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Fortnite and the Dark Web: How an illicit industry developed around this game
  • Live at: Nov 7 2018 6:00 pm
  • Presented by: Benjamin Preminger
  • From:
Your email has been sent.
or close