Cyber Threats

Cyber threats are growing as persistent and well-funded threat actors look for new avenues to exploit organizations.

  • Cyber Threats

    Cyber Threats

    Learn how Digital Shadows monitors, manages, and remediates cyber threats to your business.

    Read Report
  • ×

    Live Webinar with ADP on Oct 10th:

    Mitigate Third & Fourth Party Cyber Risks to Financial Services

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    Please Select a Time
    Thank you!
    Error - something went wrong!
  • ERP Applications Under Fire

    ERP Applications Under Fire

    The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what

    Read Report
  • Five Threats to Financial Services: Part Five, Hacktivism

    Five Threats to Financial Services: Part Five, Hacktivism

    OK, so it’s not a sexy as insider threats, banking trojans, phishing campaigns or payment card fraud, but hacktivism is ...

    Read Post
  • Episode 36: FIN7 Arrests and Phishing Threats

    Episode 36: FIN7 Arrests and Phishing Threats

    Digital Shadows’ Rose Bernard and Simon Hall join Rafael Amado to cover the arrest of three alleged members of the FIN7 organized criminal group. The team go over the United States Department of...

    Read Post
  • Protect Against Cyber Threats

    Request a Demo
  • Five Threats to Financial Services: Part Four, Payment Card Fraud

    Five Threats to Financial Services: Part Four, Payment Card Fraud

    Payment card information is the lifeblood of the cybercriminal ecosystem. In previous blogs in this series, we’ve focused on how ...

    Read Post
  • Read Full Report
  • ERP Applications Under Fire: How Cyber Attackers Target the Crown Jewels0:46

    ERP Applications Under Fire: How Cyber Attackers Target the Crown Jewels

    https://info.digitalshadows.com/ERPApplicationsUnderFire-Youtube.html The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals a

    Watch Video
  • ×

    Subscribe to get the latest news and threat intelligence in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • MITRE ATT&CK and GRU Indictment

    MITRE ATT&CK and GRU Indictment

    Read Report
  • Digital Shadows Contributes to Insider Threat Research

    Digital Shadows Contributes to Insider Threat Research

    On July 30, Forrester published its latest research report on malicious insiders, Defend Your Data As Insiders Monetize Their Access. ...

    Read Post
  • Digital Risk Protection 2018 Forrester New Wave

    Digital Risk Protection 2018 Forrester New Wave

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Alleged Carbanak Files and Source Code Leaked: Digital Shadows’ Initial Findings

    Alleged Carbanak Files and Source Code Leaked: Digital Shadows’ Initial Findings

    Digital Shadows’ Russian-linguists discovered a post from 6 July 2018 on exploit[.]in that provided files and source code that were ...

    Read Post
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age: Recorded Webinar18:45

    The State of Cybercrime in the Post-AlphaBay and Hansa Age: Recorded Webinar

    Almost one year since the AlphaBay and Hansa takedowns, no single online criminal marketplace has risen to the top. What has prevented a new marketplace from flourishing?

    Watch Video
  • Five Threats to Financial Services: Phishing Campaigns

    Five Threats to Financial Services: Phishing Campaigns

    In our last blog, we highlighted how banking trojans are a threat to banking customers and small businesses, normally delivered ...

    Read Post
  • Mitre ATT&CK™ and the Mueller GRU Indictment: Lessons for Organizations

    Mitre ATT&CK™ and the Mueller GRU Indictment: Lessons for Organizations

    A recent indictment revealed how the GRU (Russia’s Military Intelligence agency) used both influence operations and network intrusions to achieve ...

    Read Post
  • Five Cyber Threats to Financial Services: Part One, Insiders

    Five Cyber Threats to Financial Services: Part One, Insiders

    The sensitive and financial data held by banks and financial institutions, as well as their centrality to national infrastructure, makes ...

    Read Post
  • Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital risk protection consists of monitoring and remediating external risk exposure online. In this blog, I take a look at the current state of digital risk protection and where I see its future.

    Read Report
  • Cyber Threats to ERP Applications: Threat Landscape

    Cyber Threats to ERP Applications: Threat Landscape

    What are ERP Applications? Organizations rely on Enterprise Resource Planning (ERP) applications to support business processes. This includes payroll, treasury, ...

    Read Post
  • Reducing Your Attack Surface: From a Firehose to a Straw

    Reducing Your Attack Surface: From a Firehose to a Straw

    What is Attack Surface Reduction? Attack Surface Reduction is a powerful tool used to protect and harden environments. It’s a ...

    Read Post
  • Episode 32: MITRE ATT&CK™ Framework and the Mueller GRU Indictment

    Episode 32: MITRE ATT&CK™ Framework and the Mueller GRU Indictment

    In today’s ShadowTalk, we take on the Robert Mueller indictment against 12 Russian individuals for alleged US election interference. However, rather than dwell on issues of attribution and...

    Read Post
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age

    The State of Cybercrime in the Post-AlphaBay and Hansa Age

    Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.

    Read Report
  • Demystifying the Dark Web and Mitigating Risks1:03:52

    Demystifying the Dark Web and Mitigating Risks

    Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.

    Watch Video
  • loading
    Loading More...