Dark web intelligence company Searchlight Cyber has announced the launch of Stealth Browser – a new, secure virtual machine for cyber professionals to access the dark web and conduct investigations anonymously, reducing the risk to themselves and their organization. Stealth Browser is an enhancement to Searchlight’s Cerberus investigation platform, which is used by law enforcement agencies, enterprises, and MSSPs to uncover criminal activity on the dark web.
The dark web consists of sites that are not indexed by popular search engines such as Google, along with marketplaces for stolen data and cybercriminal services. Operational intelligence on what transpires on the dark web can be highly useful for security teams and critical in defending organizations against cybercriminals using compromised accounts to enable attacks, commit fraud, or conduct campaigns using spear-phishing. However, accessing the dark web carries risks for the investigator and their organization’s infrastructure, with accidental malware installation, exposure of digital fingerprints/proprietary IP addresses, and inadvertent leaking of sensitive information among the potential dangers.
More Stories
Uyghur Diaspora Group Targeted with Remote Surveillance Malware
Members of the World Uyghur Congress living in exile were targeted with a spear phishing campaign deploying surveillance malware, according...
Half of Mobile Devices Run Outdated Operating Systems
50% of mobile devices run outdated operating systems, increasing vulnerability to cyber-attacks, according to the latest report from Zimperium Read...
Researchers Note 16.7% Increase in Automated Scanning Activity
According to the 2025 Global Threat Landscape Report from FortiGuard, threat actors are executing 36,000 scans per second Read More
2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types
New Global Data Helps Organizations Move to Cyber Resilience and Shatter Silos It is no secret that AI is advancing...
ISACA Highlights Critical Lack of Quantum Threat Mitigation Strategies
An ISACA survey found that just 5% of organizations have a defined strategy to defend against quantum-enabled threats Read More
FBI Asks for Help Tracking Chinese Salt Typhoon Actors
The US authorities have asked the public to help them unmask China’s Salt Typhoon threat actors Read More