Webinars

Gain valuable insights on dark web intelligence and the StealthMole platform with our webinars and video resources
Type
Sector
Region
Clear all
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
March 2, 2026

Tracing Identity Exposure in BadBox 2.0

BadBox 2.0 highlights a complex botnet landscape where identity exposure signals surface across fragmented and hidden digital environments. This session covers the broader scope of the investigation, followed by a live profiling walkthrough of a spotlight case. Reused identifiers, scattered traces, and exposure patterns are examined to demonstrate how structured dark web investigation turns disconnected signals into contextualized threat intelligence insights.

Watch now
Region 1
All
February 2, 2026

Bangladesh Civilian Force: Fragmented Identities Behind a Single Hacktivist Brand

Explore how Bangladesh Civilian Force (BCF) evolved from apparent routine hacktivism into a coordinated digital ecosystem spanning multiple platforms. This session breaks down the investigative process used to trace defacements, recruitment signals, and cross-platform amplification, revealing how intentional identity fragmentation strengthens resilience, sustains ideological messaging, and complicates attribution in today’s cyber threat landscape.

Watch now
Region 1
All
September 4, 2024

Uncovering Users Involved in Illicit Online Activities Using Leaked Credentials

Get an inside look at how you can leverage leaked credentials to identify and track down individuals engaged in illicit online activities and illegal gambling hidden deep within the dark web. In this demo, we walk you through the step-by-step process of uncovering these individuals and investigating their activities using the various modules and tools available on StealthMole threat intelligence platform.

Watch now
Region 1
All
April 1, 2023

How to Detect Data Leaks on Hidden Networks

In this webinar, you will learn how StealthMole’s Leaked Monitoring modules works and can be used to efficiently monitor and detect relevant incidents of data leakage. Following this, you will also learn how leaked data investigations can be expanded further with the Darkweb Tracker extension, which draws data from multiple sources to provide more context into the incident.

Watch now
Region 1
Law Enforcement Agencies
June 1, 2023

Profiling Ransomware Sites on the Deep and Dark Web with StealthMole

In this webinar, you will learn how the Darkweb Tracker can be used to profile and track the activities of these ransomware gangs, using Cl0p and Lockbit as examples. Furthermore, you will also see how the network infrastructure of gangs such as Conti can be visualized using the platform.

Watch now
Region 2
Enterprises
No results found.
Botnet
Hacktivist Group
News
Dark Web Investigations
Ransomware
Data breach
Cybersecurity
Dark web