Michael Marriott

  • Nemty Ransomware: Slow and Steady Wins the Race?

    Nemty Ransomware: Slow and Steady Wins the Race?

    As we outlined recently, ransomware is a key theme of the NCSC Cyber Trends Report: it’s a pervasive threat that ...

    Read Post
  • Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers

    Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers

    Whether it’s intellectual property, proprietary code, personal data, or financial information, the goal of information security is to protect those ...

    Read Post
  • Managing Digital Risk: 4 Steps to Take

    Managing Digital Risk: 4 Steps to Take

    In this blog, we walk you through the emergence of digital risks and key steps you can take to help your organization to securely achieve the benefits of digital transformation.

    Read Post
  • Partnering with SecureLink to help organizations minimize their digital risk

    Partnering with SecureLink to help organizations minimize their digital risk

    Today we announced that SecureLink, one of Europe’s most respected independent cybersecurity and managed service providers, has partnered with Digital ...

    Read Post
  • Reducing Your Attack Surface

    Reducing Your Attack Surface

    What is an attack surface According to OWASP, an attack surface “describes all of the different points where an attacker could ...

    Read Post
  • How to Secure Your Online Brand

    How to Secure Your Online Brand

    What is online brand security? As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand ...

    Read Post
  • Digital Shadows New Integration for Splunk

    Digital Shadows New Integration for Splunk

    Today we announced the release of an updated version of our Splunk App, which is now certified for both Splunk ...

    Read Post
  • Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online

    Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online

    VIPs and executives who are critical to your company and brand can be targeted by threat actors or groups who ...

    Read Post
  • Bank Discovers Customer Credit Card Numbers Traded Online

    Bank Discovers Customer Credit Card Numbers Traded Online

    Payment card fraud costs banks and merchants nearly $23 billion a year and rising. As consumers spend more money online, ...

    Read Post
  • Phishing Site Impersonates Financial Services Institution

    Phishing Site Impersonates Financial Services Institution

    If the infamous bank robber, Willie Sutton, were alive today and honed his cyber skills, he might turn his attention ...

    Read Post
  • 33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    Last week, I wrote about how cybercriminals are looking to trade corporate emails in their pursuit of conducting Business Email ...

    Read Post
  • Business Email Compromise: When You Don’t Need to Phish

    Business Email Compromise: When You Don’t Need to Phish

    According to the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) have caused $12 billion in losses since ...

    Read Post
  • 10 Things You Didn’t Know You Could Do with Shadow Search™

    10 Things You Didn’t Know You Could Do with Shadow Search™

    You may have seen that we’ve recently released Shadow Search, a new tool that gives you immediate access to both ...

    Read Post
  • Online Risks to Fortnite Users

    Online Risks to Fortnite Users

    With an enticing array of viral dance moves, tough weekly challenges and fresh skins, people are going bananas for Fortnite. ...

    Read Post
  • Five Threats to Financial Services: Part Five, Hacktivism

    Five Threats to Financial Services: Part Five, Hacktivism

    OK, so it’s not a sexy as insider threats, banking trojans, phishing campaigns or payment card fraud, but hacktivism is ...

    Read Post
  • Five Threats to Financial Services: Part Four, Payment Card Fraud

    Five Threats to Financial Services: Part Four, Payment Card Fraud

    Payment card information is the lifeblood of the cybercriminal ecosystem. In previous blogs in this series, we’ve focused on how ...

    Read Post
  • Cyber Threats to ERP Applications: Threat Landscape

    Cyber Threats to ERP Applications: Threat Landscape

    What are ERP Applications? Organizations rely on Enterprise Resource Planning (ERP) applications to support business processes. This includes payroll, treasury, ...

    Read Post
  • How Cybercriminals are Using Messaging Platforms

    How Cybercriminals are Using Messaging Platforms

    Alternative Ways Criminals Transact Online: A Moving Target Last week, the cracking forum (specialized in tools for gaining unauthorized access ...

    Read Post
  • When There’s No Need to Hack: Exposed Personal Information

    When There’s No Need to Hack: Exposed Personal Information

    With Equifax‘s breach of 145 million records still fresh in everyone’s memory and the recent Facebook data privacy controversy, protecting personal ...

    Read Post
  • When Sharing Is Not Caring: Over 1.5 Billion Files Exposed Through Misconfigured Services

    When Sharing Is Not Caring: Over 1.5 Billion Files Exposed Through Misconfigured Services

    Our recent report “Too Much Information”, discovered over 1.5 billion files from a host of services, including Amazon S3 buckets, ...

    Read Post
  • loading
    Loading More...