Michael Marriott

  • Access Keys Exposed: More Than 40% Are For Database Stores

    Access Keys Exposed: More Than 40% Are For Database Stores

    By now, we’ve all heard news about AWS keys leaked by a developer on GitHub. While this can cause damaging ...

    Read Post
  • Validate Exposed Credentials with Okta to Save Even More Time

    Validate Exposed Credentials with Okta to Save Even More Time

    SearchLight customers can now automatically validate credential alerts via an integration with Okta, drastically reducing the time required to triage.  ...

    Read Post
  • What is DevSecOps and Why Do We Need It?

    What is DevSecOps and Why Do We Need It?

    DevSecOps, SecDevOps, and any variation of those words are massively trending topics in tech companies today. People love to talk ...

    Read Post
  • The Rise of OpenBullet: A Deep Dive in the Attacker’s ATO toolkit

    The Rise of OpenBullet: A Deep Dive in the Attacker’s ATO toolkit

    Account takeover (ATO) has become a serious issue for many organizations. Digital Shadows has identified over 15 billion credentials circulating ...

    Read Post
  • SearchLight’s Credential Validation: Only Focus on What Matters

    SearchLight’s Credential Validation: Only Focus on What Matters

    Of the many use cases associated with threat intelligence and digital risk protection, monitoring for exposed credentials is always one ...

    Read Post
  • Tax Fraud in 2020: Down But Not Out

    Tax Fraud in 2020: Down But Not Out

    While it may seem that tax fraud is not as widely reported as in previous years, tax-related fraud continues to be a popular approach for cybercriminals.

    Read Post
  • Security Threat Intel Products and Services: Mapping SearchLight

    Security Threat Intel Products and Services: Mapping SearchLight

    Very few organizations have access to vast resources that will enable them to build out a ...

    Read Post
  • Asset Inventory Management: Difficult But Essential

    Asset Inventory Management: Difficult But Essential

    Asset inventories are one of the most important things to get right. Done correctly, they give you the best insight into your potential attack surface and identify where to focus your efforts.

    Read Post
  • Nemty Ransomware: Slow and Steady Wins the Race?

    Nemty Ransomware: Slow and Steady Wins the Race?

    As we outlined recently, ransomware is a key theme of the NCSC Cyber Trends Report: it’s a pervasive threat that ...

    Read Post
  • Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers

    Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers

    Whether it’s intellectual property, proprietary code, personal data, or financial information, the goal of information security is to protect those ...

    Read Post
  • Managing Digital Risk: 4 Steps to Take

    Managing Digital Risk: 4 Steps to Take

    In this blog, we walk you through the emergence of digital risks and key steps you can take to help your organization to securely achieve the benefits of digital transformation.

    Read Post
  • Partnering with SecureLink to help organizations minimize their digital risk

    Partnering with SecureLink to help organizations minimize their digital risk

    Today we announced that SecureLink, one of Europe’s most respected independent cybersecurity and managed service providers, has partnered with Digital ...

    Read Post
  • Reducing Your Attack Surface

    Reducing Your Attack Surface

    What is an attack surface According to OWASP, an attack surface “describes all of the different points where an attacker could ...

    Read Post
  • How to Secure Your Online Brand

    How to Secure Your Online Brand

    What is online brand security? As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand ...

    Read Post
  • Digital Shadows New Integration for Splunk

    Digital Shadows New Integration for Splunk

    Today we announced the release of an updated version of our Splunk App, which is now certified for both Splunk ...

    Read Post
  • Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online

    Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online

    VIPs and executives who are critical to your company and brand can be targeted by threat actors or groups who ...

    Read Post
  • Bank Discovers Customer Credit Card Numbers Traded Online

    Bank Discovers Customer Credit Card Numbers Traded Online

    Payment card fraud costs banks and merchants nearly $23 billion a year and rising. As consumers spend more money online, ...

    Read Post
  • Phishing Site Impersonates Financial Services Institution

    Phishing Site Impersonates Financial Services Institution

    If the infamous bank robber, Willie Sutton, were alive today and honed his cyber skills, he might turn his attention ...

    Read Post
  • 33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    Last week, I wrote about how cybercriminals are looking to trade corporate emails in their pursuit of conducting Business Email ...

    Read Post
  • Business Email Compromise: When You Don’t Need to Phish

    Business Email Compromise: When You Don’t Need to Phish

    According to the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) have caused $12 billion in losses since ...

    Read Post
  • loading
    Loading More...