{"id":104904,"date":"2025-03-05T11:47:22","date_gmt":"2025-03-05T03:47:22","guid":{"rendered":"https:\/\/version-2.com\/?p=104904"},"modified":"2025-02-28T11:50:58","modified_gmt":"2025-02-28T03:50:58","slug":"inside-the-dark-web-how-the-guardz-research-unit-unveils-emerging-cyber-threats-targeting-small-businesses","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/03\/inside-the-dark-web-how-the-guardz-research-unit-unveils-emerging-cyber-threats-targeting-small-businesses\/","title":{"rendered":"Inside the Dark Web: How the Guardz Research Unit Unveils Emerging Cyber Threats Targeting Small Businesses"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"104904\" class=\"elementor elementor-104904\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/guardz.com\/wp-content\/uploads\/2025\/02\/Exposed-600-to-Hack-a-Law-Firm.jpg.webp\" width=\"1280\" height=\"720\" \/><\/p><div class=\"elementor-element elementor-element-2f97e81 elementor-widget elementor-widget-theme-post-content\" data-id=\"2f97e81\" data-element_type=\"widget\" data-widget_type=\"theme-post-content.default\"><div class=\"elementor-widget-container\"><h4 class=\"wp-block-heading\"><strong>Exploring the Digital Underground to Safeguard SMBs<\/strong><\/h4><p>Cybercriminals are constantly evolving their tactics, leveraging hidden corners of the internet to sell access to small and medium-sized businesses (SMBs). To stay ahead of these threats, the <strong>Guardz Research Unit (GRU)<\/strong> continuously monitors dark web marketplaces, underground forums, and other cybercrime hubs to uncover the latest trends that put SMBs at risk.<\/p><p>Our latest investigation has revealed a concerning rise in cybercriminal services tailored specifically to targeting SMBs, including law and accounting firms. One alarming example: a dark web listing offering admin-level access to a U.S. law firm for just $600, exploiting an eight-year-old unpatched vulnerability.<\/p><p>This finding is just one of many that highlight the growing attack-as-a-service economy, where cybercriminals trade stolen credentials, exploit remote access systems, and sell persistent backdoor access, leaving businesses vulnerable to ransomware, fraud, and devastating reputational damage.<\/p><h4 class=\"wp-block-heading\"><strong>Key Trends Uncovered by the Guardz Research Unit:<\/strong><\/h4><ul class=\"wp-block-list\"><li><strong>Stolen Business Access for Sale<\/strong> \u2013 Dark web marketplaces feature listings for Remote Desktop Protocol (RDP) and Virtual Private Networks (VPN) credentials, granting full control over small business networks.<\/li><li><strong>Cybercrime is Alarmingly Affordable<\/strong> \u2013 Attackers can purchase unauthorized access to SMBs, including law firms and accounting firms, at shockingly low prices, making these businesses prime targets for fraud and extortion.<\/li><li><strong>Unpatched Vulnerabilities Fuel Attacks<\/strong> \u2013 Businesses failing to patch old security flaws remain wide open to breaches, with cybercriminals exploiting security gaps that have been disclosed for years.<\/li><li>\u00a0<strong>Persistent Access and Long-Term Exploitation<\/strong> \u2013 Many attacks don\u2019t end after initial access; criminals implant malware, keyloggers, and hidden backdoors, allowing them to return undetected for future data theft and extortion.<\/li><\/ul><h3 class=\"wp-block-heading\"><strong>Why This Matters for SMBs<\/strong><\/h3><p>Small businesses, especially those handling sensitive financial and legal data, remain a primary focus of cybercriminal activity. The Guardz Research Unit is working to expose these threats in real-time so that SMBs can take proactive steps to secure their networks before they become the next target.<\/p><p>Cybercriminals innovate their tactics daily, so cybersecurity defenses must evolve just as fast. By staying informed on emerging threats, SMBs can adopt a proactive security approach to protect themselves, their clients, and their reputations.<\/p><p>At Guardz, we are committed to helping SMBs close security gaps and prevent breaches before they happen. Stay tuned for our full report, where we\u2019ll dive deeper into the latest dark web discoveries and provide actionable security strategies to keep your business safe.<\/p><h3 class=\"wp-block-heading\"><strong>Protecting Those at Risk<\/strong><\/h3><p>As part of this investigation, Guardz identified a law firm that was specifically named within dark web forums. We took immediate steps to notify the firm, ensuring they are aware of the threat and can take appropriate measures to protect their systems. Guardz remains available to assist in securing their business and mitigating potential risks.<\/p><p>Additionally, in our published report, we have not disclosed any company names, identifiers, or details that could expose businesses to further threats. Our mission is to raise awareness and equip SMBs with the insights and tools they need to defend against cyber risks.<\/p><h3 class=\"wp-block-heading\"><strong>Findings from the Dark Web<\/strong><\/h3><p>GRU\u2019s recent dive into dark web forums revealed an alarming trend: threat actors are actively targeting Small businesses, particularly law and accounting firms. The reasons are clear\u2014these organizations handle sensitive and lucrative data, such as financial records, legal documentation, and personally identifiable information (PII), making them attractive to cybercriminals.<\/p><p>Key GRU findings include:<\/p><ul class=\"wp-block-list\"><li><strong>Exploitation of Unpatched Vulnerabilities:<\/strong> Over 15% of the analyzed dark web listings offered access to organizations through known vulnerabilities that had been disclosed years ago.<\/li><li><strong>Sale of Stolen Credentials:<\/strong> Credentials for Small businesses networks\u2014both admin-level and standard user accounts\u2014are being sold at an average price of $600. Some listings even include bundled \u201caccess packs\u201d with multiple entry points to the same organization.<\/li><li><strong>Ransomware as a Service (RaaS):<\/strong> Cybercriminal groups are offering turnkey ransomware solutions on the dark web, making it easier than ever for even non-technical actors to launch devastating attacks.<\/li><\/ul><p>These findings highlight the growing sophistication and accessibility of cybercrime, making Small businesses an increasingly vulnerable target.<\/p><h3 class=\"wp-block-heading\"><strong>Threat Analysis: How Small Businesses Are Being Exploited<\/strong><\/h3><h4 class=\"wp-block-heading\"><strong>1. Unpatched Vulnerabilities: A Ticking Time Bomb<\/strong><\/h4><p>In the Guardz Research Unit recent uncovered findings, an American law firm was still vulnerable to the EternalBlue exploit\u2014a flaw in Windows\u2019 Server Message Block (Small businesses) protocol disclosed back in 2017. This vulnerability was infamously exploited in the global WannaCry ransomware attack, which caused billions in damages. Despite being patched years ago, GRU found that threat actors were still leveraging it to gain access to unprotected networks.<\/p><p>The potential damage behind this vulnerability is equally alarming:<\/p><ul class=\"wp-block-list\"><li>According to various estimations, over <strong>100,000 devices worldwide<\/strong> are estimated to remain unpatched against EternalBlue.<\/li><li>A single ransomware attack exploiting this vulnerability can cost Small businesses an average of <strong>$120,000<\/strong> in recovery expenses, not to mention reputational damage.<\/li><\/ul><p>One dark web listing advertised admin-level access to a law firm\u2019s network, complete with instructions on how to exploit the EternalBlue flaw, for just $600\u2014a devastatingly low price for such significant access.<\/p><figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXcm3os94yYxtowOaiYyhKbkRJPlusTYUyPV4cyH69IhgljP4065fb69sH1iVN_62Mw5CpGEPABWtRuxc22wXA6aVcJFKS2QMnsWG_fJw5m-VgG5TtejppbbM4vBc9_fzYLla1pJ9g?key=2slzpfEhUGtWWnygilDjK1VY\" alt=\"\" \/><noscript><img decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXcm3os94yYxtowOaiYyhKbkRJPlusTYUyPV4cyH69IhgljP4065fb69sH1iVN_62Mw5CpGEPABWtRuxc22wXA6aVcJFKS2QMnsWG_fJw5m-VgG5TtejppbbM4vBc9_fzYLla1pJ9g?key=2slzpfEhUGtWWnygilDjK1VY\" alt=\"\"\/><\/noscript><\/figure><p><strong><em>VPN Access to a law firm in Puerto Rico sold on the Darkweb<\/em><\/strong><\/p><hr class=\"wp-block-separator has-alpha-channel-opacity\" \/><h4 class=\"wp-block-heading\"><strong>2. RDP and VPN Exploits: A Gateway for Attackers<\/strong><\/h4><p>Remote Desktop Protocol (RDP) and Virtual Private Network (VPN) tools are critical for enabling remote work, but they have also become prime targets for cybercriminals. GRU identified multiple listings on dark web forums advertising access to small business networks through compromised RDP and VPN credentials.<\/p><ul class=\"wp-block-list\"><li><strong>High-Value Credentials:<\/strong> In one case, admin-level RDP credentials for an accounting firm were auctioned off for $1,800, giving the buyer unrestricted access to sensitive financial systems.<\/li><li><strong>Low-Cost Entry Points:<\/strong> Lower-level credentials were available for as little as $300, yet they still offered significant opportunities for skilled attackers to escalate their access.<\/li><\/ul><p>The potential threat here paints a grim picture:<\/p><ul class=\"wp-block-list\"><li>A 2024 <a href=\"https:\/\/cyberreadinessinstitute.org\/news-and-events\/new-study-underscores-slow-adoption-of-multifactor-authenification\/\" target=\"_blank\" rel=\"noopener\">study<\/a> by the Cyber Readiness Institute found that nearly two-thirds (65%) of global SMBs do not use MFA and have no plans to implement it in the near future.<\/li><\/ul><figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXfCRoXslsRWowSb04o3kID-8JoxguSZ8t7uzBXXWHIzmTtChCoKxQFoAV2v6htR49QK-G4CzO1qeF5wuYU2F3n0AxEZM3O-bWqjNqcqHoPvCZE95CwVxCqV4LCcuTG13d810jno5g?key=2slzpfEhUGtWWnygilDjK1VY\" alt=\"\" \/><noscript><img decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXfCRoXslsRWowSb04o3kID-8JoxguSZ8t7uzBXXWHIzmTtChCoKxQFoAV2v6htR49QK-G4CzO1qeF5wuYU2F3n0AxEZM3O-bWqjNqcqHoPvCZE95CwVxCqV4LCcuTG13d810jno5g?key=2slzpfEhUGtWWnygilDjK1VY\" alt=\"\"\/><\/noscript><\/figure><figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXcoBBxr1M8mFA7MJ52iLZPpjrI7kLn0xniDmOExEuz0bn-IAxCu2pXUgFWRYCSN1uBa0xjwZNkfGnhJmsiJM9YcBVBwVkSjgo_tLz9GJJYP34F7_CWADvXNkJZhLoMFe5HvcKxXmA?key=2slzpfEhUGtWWnygilDjK1VY\" alt=\"\" \/><noscript><img decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXcoBBxr1M8mFA7MJ52iLZPpjrI7kLn0xniDmOExEuz0bn-IAxCu2pXUgFWRYCSN1uBa0xjwZNkfGnhJmsiJM9YcBVBwVkSjgo_tLz9GJJYP34F7_CWADvXNkJZhLoMFe5HvcKxXmA?key=2slzpfEhUGtWWnygilDjK1VY\" alt=\"\"\/><\/noscript><\/figure><p><strong>RDP Access to accounting firm Sold on DarkWeb<\/strong><\/p><h4 class=\"wp-block-heading\"><strong>3. Ransomware: The Hall of Shame<\/strong><\/h4><p>Ransomware gangs have evolved their tactics beyond simple file encryption. Today, these groups often engage in double extortion, threatening to leak sensitive data if ransom demands are not met. GRU documented a particularly devastating example involving a U.S. family law firm. After refusing to pay a ransom, the firm\u2019s sensitive client data was leaked on a dark web \u201chall of shame\u201d site, resulting in irreparable reputational damage.<\/p><p>The impact of ransomware on Small businesses is staggering:<\/p><ul class=\"wp-block-list\"><li><strong>Financial Losses<\/strong>: The <a href=\"https:\/\/www.verizon.com\/business\/resources\/articles\/small-business-cyber-security-and-data-breaches\/#:~:text=Some%2060%25%20of%20small%20businesses,putting%20proper%20security%20in%20place.\" target=\"_blank\" rel=\"noopener\">average<\/a> cost of a ransomware attack on small businesses is approximately $26,000.<br \/><a href=\"https:\/\/www.businessdasher.com\/small-business-cyber-attack-statistics\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\">\u00a0<\/a><\/li><li><strong>Operational Disruptions<\/strong>: Following a ransomware attack, 50% of small and medium-sized businesses <a href=\"https:\/\/www.strongdm.com\/blog\/small-business-cyber-security-statistics?\" target=\"_blank\" rel=\"noopener\">report<\/a> that it took 24 hours or longer to recover, leading to significant downtime and loss of productivity.<\/li><\/ul><figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXfHhjCrbeQuyxsHttbqM69ZyYC7eCeXwmv9AeMNJF8DPHhPznJTzN0Gwis8Jf9xtNhzVGcRYhyr3VKf2j_iacFqHCaGQVgT5UgLbgxQMyIffyPNd6abDRYL97JtW7U2n4KAGWPArQ?key=2slzpfEhUGtWWnygilDjK1VY\" alt=\"\" \/><noscript><img decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXfHhjCrbeQuyxsHttbqM69ZyYC7eCeXwmv9AeMNJF8DPHhPznJTzN0Gwis8Jf9xtNhzVGcRYhyr3VKf2j_iacFqHCaGQVgT5UgLbgxQMyIffyPNd6abDRYL97JtW7U2n4KAGWPArQ?key=2slzpfEhUGtWWnygilDjK1VY\" alt=\"\"\/><\/noscript><\/figure><h3 class=\"wp-block-heading\"><strong>The Risk and Potential Damages to Small Businesses<\/strong><\/h3><p>The infiltration of a small business network via Remote Desktop Protocol (RDP), VPN exploits, or unpatched vulnerabilities can lead to severe and often irreversible consequences. Once cybercriminals gain access, they can:<\/p><ul class=\"wp-block-list\"><li><strong>Deploy Ransomware:<\/strong> Attackers can encrypt all business-critical files, rendering systems inoperable until a ransom is paid\u2014often in cryptocurrency. Many businesses that refuse to pay suffer prolonged downtime, loss of sensitive client data, and legal repercussions if personally identifiable information (PII) is exposed.<\/li><li><strong>Steal and Sell Confidential Data:<\/strong> Law firms, accounting firms, and other professional service providers store sensitive financial records, legal case files, tax information, and personally identifiable data. Cybercriminals frequently sell or leak this data, leading to regulatory fines, lawsuits, and a loss of client trust.<\/li><li><strong>Launch Fraudulent Transactions: <\/strong>With admin-level access, attackers can manipulate financial records, initiate fraudulent wire transfers, or reroute funds, causing direct financial losses that can be difficult to recover.<\/li><li><strong>Set Up Persistent Access for Future Exploits:<\/strong> Many cybercriminals install backdoors, keyloggers, and other malware that allow them to return at will, siphon off data over time, or launch additional attacks without detection.<\/li><li><strong>Use the Business as a Springboard for Attacking Others:<\/strong> A compromised firm can be leveraged to infiltrate clients, suppliers, or business partners, especially if they have interconnected networks or shared credentials. This can trigger legal liability and reputational damage that extends far beyond the initial breach.<\/li><li><strong>Disrupt Operations for Extended Periods:<\/strong> For many small businesses, even a few days of downtime can be financially devastating. Attackers often sabotage systems, delete backups, or corrupt data to make recovery nearly impossible without external intervention.<\/li><\/ul><h3 class=\"wp-block-heading\"><strong>Risks Amplified: Why Small Businesses Are Prime Targets<\/strong><\/h3><p>Small businesses often lack the resources and expertise of larger organizations, making them appealing targets for cybercriminals. Key risk factors include:<\/p><ul class=\"wp-block-list\"><li><strong>Inadequate Security Budgets:<\/strong> Many Small businesses operate on tight budgets, often prioritizing operational costs over cybersecurity.<\/li><li><strong>Overlooked Patching:<\/strong> GRU\u2019s findings show that many Small businesses fail to patch vulnerabilities in a timely manner, leaving them exposed to known threats.<\/li><li><strong>Weak Credential Policies:<\/strong> The reuse of passwords across multiple accounts remains a widespread issue, providing easy entry points for attackers.<\/li><li><strong>Supply Chain Vulnerabilities:<\/strong> Small businesses often rely on third-party vendors, creating additional attack vectors for cybercriminals.<\/li><\/ul><h3 class=\"wp-block-heading\"><strong>Guardz: A Trusted Ally in Cybersecurity<\/strong><\/h3><p>As the cybersecurity landscape grows increasingly complex, Guardz is transforming the charge to protect small businesses. Through its innovative AI-powered platform, Guardz empowers MSPs to deliver cutting-edge cybersecurity solutions tailored to the needs of small businesses.<\/p><p><strong>How Guardz Makes a Difference:<\/strong><\/p><ul class=\"wp-block-list\"><li><strong>Proactive Threat Detection:<\/strong> Guardz\u2019s platform identifies vulnerabilities and mitigates risks before they can be exploited.<\/li><li><strong>Automated Responses:<\/strong> The platform provides real-time, automated responses to emerging threats, minimizing damage and downtime.<\/li><li><strong>Cyber Awareness Training:<\/strong> Guardz equips small businesses with the knowledge and tools to recognize and respond to social engineering attempts, such as phishing attacks.<\/li><li><strong>Phishing Simulations:<\/strong> To bolster defenses against one of the most common attack vectors, Guardz offers AI-powered phishing simulations, helping small businesses and their employees stay vigilant.<\/li><\/ul><h3 class=\"wp-block-heading\"><strong>A Path Forward: Recommendations for Small Businesses<\/strong><\/h3><p>GRU\u2019s findings serve as a wake-up call for small businesses across all sectors. To stay ahead of cybercriminals, small businesses must adopt a proactive approach to cybersecurity. Key recommendations include:<\/p><ol class=\"wp-block-list\"><li><strong>Regular Patch Management:<\/strong> Ensure all software and systems are up to date to eliminate known vulnerabilities.<\/li><li><strong>Strong Credential Policies:<\/strong> Implement MFA and enforce unique, complex passwords across all accounts.<\/li><li><strong>Data Backups:<\/strong> Maintain separate, secure backups of all critical data to ensure business continuity in the event of an attack.<\/li><li><strong>Employee Training:<\/strong> Invest in ongoing cybersecurity awareness training to reduce the risk of human error.<\/li><li><strong>Partner with an MSP:<\/strong> Work with a trusted MSP equipped with Guardz\u2019s platform to ensure 24\/7 protection.<\/li><\/ol><p>The findings from the Guardz Research Unit highlight a sobering reality: the dark web is teeming with threats aimed squarely at small businesses. From unpatched vulnerabilities to stolen credentials and ransomware attacks, small businesses face a range of risks that can devastate their operations and reputations.<\/p><p>But it doesn\u2019t have to be this way. By taking proactive measures and partnering with cybersecurity leaders like Guardz, small businesses can turn the tide, protecting their data, their clients, and their futures.<\/p><p>In an age where cybercrime shows no signs of slowing down, Guardz stands as a beacon of hope, empowering MSPs to safeguard the lifeblood of the economy and our small businesses. The message is clear: Stay vigilant, stay prepared, and let Guardz protect what matters most.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86d84e0 elementor-widget elementor-widget-button\" data-id=\"86d84e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/guardz.com\/distributors\/v2\/?utm_source=web&#038;utm_medium=v2sg&#038;utm_campaign=guardz&#038;utm_content=trial\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start Free Trial<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"76994\" class=\"elementor elementor-76994\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Guardz<br \/><\/strong>Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Exploring the Digital Underground to Safeguard SMBs Cyb [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1276,1305,61],"tags":[1077,1277],"class_list":["post-104904","post","type-post","status-publish","format-standard","hentry","category-guardz","category-1305","category-press-release","tag-1077","tag-guardz"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Inside the Dark Web: How the Guardz Research Unit Unveils Emerging Cyber Threats Targeting Small Businesses - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/guardz.com\/blog\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inside the Dark Web: How the Guardz Research Unit Unveils Emerging Cyber Threats Targeting Small Businesses - Version 2\" \/>\n<meta property=\"og:description\" content=\"Exploring the Digital Underground to Safeguard SMBs Cyb [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/guardz.com\/blog\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-05T03:47:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/guardz.com\/wp-content\/uploads\/2025\/02\/Exposed-600-to-Hack-a-Law-Firm.jpg.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/03\\\/inside-the-dark-web-how-the-guardz-research-unit-unveils-emerging-cyber-threats-targeting-small-businesses\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Inside the Dark Web: How the Guardz Research Unit Unveils Emerging Cyber Threats Targeting Small Businesses\",\"datePublished\":\"2025-03-05T03:47:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/03\\\/inside-the-dark-web-how-the-guardz-research-unit-unveils-emerging-cyber-threats-targeting-small-businesses\\\/\"},\"wordCount\":1880,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Exposed-600-to-Hack-a-Law-Firm.jpg.webp\",\"keywords\":[\"2025\",\"Guardz\"],\"articleSection\":[\"Guardz\",\"2025\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/guardz.com\\\/blog\\\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/03\\\/inside-the-dark-web-how-the-guardz-research-unit-unveils-emerging-cyber-threats-targeting-small-businesses\\\/\",\"url\":\"https:\\\/\\\/guardz.com\\\/blog\\\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\\\/\",\"name\":\"Inside the Dark Web: How the Guardz Research Unit Unveils Emerging Cyber Threats Targeting Small Businesses - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Exposed-600-to-Hack-a-Law-Firm.jpg.webp\",\"datePublished\":\"2025-03-05T03:47:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/guardz.com\\\/blog\\\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\\\/#primaryimage\",\"url\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Exposed-600-to-Hack-a-Law-Firm.jpg.webp\",\"contentUrl\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Exposed-600-to-Hack-a-Law-Firm.jpg.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Inside the Dark Web: How the Guardz Research Unit Unveils Emerging Cyber Threats Targeting Small Businesses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Inside the Dark Web: How the Guardz Research Unit Unveils Emerging Cyber Threats Targeting Small Businesses - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/guardz.com\/blog\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\/","og_locale":"zh_HK","og_type":"article","og_title":"Inside the Dark Web: How the Guardz Research Unit Unveils Emerging Cyber Threats Targeting Small Businesses - Version 2","og_description":"Exploring the Digital Underground to Safeguard SMBs Cyb [&hellip;]","og_url":"https:\/\/guardz.com\/blog\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\/","og_site_name":"Version 2","article_published_time":"2025-03-05T03:47:22+00:00","og_image":[{"url":"https:\/\/guardz.com\/wp-content\/uploads\/2025\/02\/Exposed-600-to-Hack-a-Law-Firm.jpg.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"19 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/guardz.com\/blog\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/03\/inside-the-dark-web-how-the-guardz-research-unit-unveils-emerging-cyber-threats-targeting-small-businesses\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Inside the Dark Web: How the Guardz Research Unit Unveils Emerging Cyber Threats Targeting Small Businesses","datePublished":"2025-03-05T03:47:22+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/03\/inside-the-dark-web-how-the-guardz-research-unit-unveils-emerging-cyber-threats-targeting-small-businesses\/"},"wordCount":1880,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/guardz.com\/blog\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/guardz.com\/wp-content\/uploads\/2025\/02\/Exposed-600-to-Hack-a-Law-Firm.jpg.webp","keywords":["2025","Guardz"],"articleSection":["Guardz","2025","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/guardz.com\/blog\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/03\/inside-the-dark-web-how-the-guardz-research-unit-unveils-emerging-cyber-threats-targeting-small-businesses\/","url":"https:\/\/guardz.com\/blog\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\/","name":"Inside the Dark Web: How the Guardz Research Unit Unveils Emerging Cyber Threats Targeting Small Businesses - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/guardz.com\/blog\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\/#primaryimage"},"image":{"@id":"https:\/\/guardz.com\/blog\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/guardz.com\/wp-content\/uploads\/2025\/02\/Exposed-600-to-Hack-a-Law-Firm.jpg.webp","datePublished":"2025-03-05T03:47:22+00:00","breadcrumb":{"@id":"https:\/\/guardz.com\/blog\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/guardz.com\/blog\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/guardz.com\/blog\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\/#primaryimage","url":"https:\/\/guardz.com\/wp-content\/uploads\/2025\/02\/Exposed-600-to-Hack-a-Law-Firm.jpg.webp","contentUrl":"https:\/\/guardz.com\/wp-content\/uploads\/2025\/02\/Exposed-600-to-Hack-a-Law-Firm.jpg.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/guardz.com\/blog\/exposed-600-to-hack-a-law-firm-guardz-research-unit-uncovers-trend-of-dark-web-attack-as-a-service-trend-endangering-small-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Inside the Dark Web: How the Guardz Research Unit Unveils Emerging Cyber Threats Targeting Small Businesses"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-ri0","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/104904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=104904"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/104904\/revisions"}],"predecessor-version":[{"id":104911,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/104904\/revisions\/104911"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=104904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=104904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=104904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}