Data Leakage Detection

Reduce the amount of information available for reconnaissance or corporate espionage.

  • Data Leakage Detection Overview

    Data Leakage Detection Overview

    Detect sensitive data that's been exposed by employees, contractors, or third parties.

    Read Report
  • Check out our Weekly Intelligence Summary

    Access Here
  • 2.3 billion files exposed across online file storage technologies

    2.3 billion files exposed across online file storage technologies

    Currently 2.3 billion files are being made publicly available by misconfigured and non-secured technologies used to store this data such as Amazon S3 buckets, Server Message Block (SMB), File Transfer

    Read Post
  • ×

    Account Takeover: Data Findings, Popular Tools, and Prevalent Actors

    - July 15 -
    Live Webinar

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2020 June - ATO Webinar
    Thank you!
    Error - something went wrong!
  • How One Large Bank Detected More Than 50,000 Exposed Credentials in 1 Year | Case Study

    How One Large Bank Detected More Than 50,000 Exposed Credentials in 1 Year | Case Study

    See how one large bank detected more than 50,000 exposed credentials in 1 year.

    Read Report
  • Reducing technical leakage: Detecting software exposure from the outside-in

    Reducing technical leakage: Detecting software exposure from the outside-in

    Modern Development Practices Leads to Increased Exposure As customers, we can be a bit demanding when it comes to technology ...

    Read Post
  • Your Data at Risk – Emerging Cyber Threats to Your Enterprise with the FBI Cyber Division56:13

    Your Data at Risk – Emerging Cyber Threats to Your Enterprise with the FBI Cyber Division

    The first half of 2019 has revealed no ebb in the number of massive data breaches and cybersecurity disasters. As the threat landscape continues to evolve and unfortunate enterprises have become the v

    Watch Video
  • How Digital Shadows Helped Find and Remediate an Exposed Admin Password on Github

    How Digital Shadows Helped Find and Remediate an Exposed Admin Password on Github

    In this blog series, we’ll share some tales from the front lines – keeping client names anonymous, of course. We’ll investigate some of SearchLight’s most impactful findings, and more importantly, she

    Read Post
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Too Much Information: The Sequel | New Research

    Too Much Information: The Sequel | New Research

    There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.

    Read Report
  • How to minimize cybersecurity breaches in 2020

    How to minimize cybersecurity breaches in 2020

    Seriously, don’t click back or close – I promise it’s not another one of those “buy all the newest stuff ...

    Read Post
  • Technical Leakage Detection Overview

    Technical Leakage Detection Overview

    SearchLight searches identifies exposed technical information by alerting organizations to unauthorized commits to public code repositories, exposed access keys, and other type of exposed technical...

    Read Report
  • DevSecOps: Continued Database Exposures Point to Growing Challenges

    DevSecOps: Continued Database Exposures Point to Growing Challenges

    Last week, we learned that millions of Ecuadorian’s personal details had been exposed by a misconfigured ElasticSearch database. This is ...

    Read Post
  • Asset Inventory Management: Difficult But Essential

    Asset Inventory Management: Difficult But Essential

    Asset inventories are one of the most important things to get right. Done correctly, they give you the best insight into your potential attack surface and identify where to focus your efforts.

    Read Post
  • Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat

    Read Post
  • Cybercriminal credit card stores: Is Brian out of the club?

    Cybercriminal credit card stores: Is Brian out of the club?

    In this blog, we determine whether this targeted attack on BriansClub will impact the wider cybercriminal credit carding landscape, and speculate whether it could galvanize the community to push anoth

    Read Post
  • Honeypots: Tracking Attacks Against Misconfigured or Exposed Services

    Honeypots: Tracking Attacks Against Misconfigured or Exposed Services

    Honeypots can be useful tools for gathering information on current attack techniques. Conversely, they can be an overwhelming source of ...

    Read Post
  • Understanding the Consequences of Data Leakage through History

    Understanding the Consequences of Data Leakage through History

    One of the most interesting aspects of transitioning from high school history teacher to cyber threat intelligence professional is the ...

    Read Post
  • Breach! Exploring the Modern Digital Breach: Part 228:13

    Breach! Exploring the Modern Digital Breach: Part 2

    What practical steps should organizations and the professionals within them be thinking about in this new world? We have a special two-part series where Rick Holland, VP Intelligence and CISO at Digit

    Watch Video
  • ANU Breach Report: Mapping to Mitre ATT&CK Framework

    ANU Breach Report: Mapping to Mitre ATT&CK Framework

    We decided to map this intrusion to the Mitre ATT&CK framework, as we have done previously for:

    Read Post
  • Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework

    Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework

    When the attacker, Andrei Tyurin, pleaded guilty, we thought we could look at the attacker goals, their TTPs and map this to the Mitre PRE-ATT&CK and ATT&CK framework.

    Read Post
  • Harnessing Exposed Data to Enhance Cyber Intelligence

    Harnessing Exposed Data to Enhance Cyber Intelligence

    We will walk you through each stage of this exploited data cycle to illustrate the economy of exposed credentials, and then present ways you can protect and mitigate the threats targeting your organiz

    Read Post
  • Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar42:41

    Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar

    Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circula

    Watch Video
  • loading
    Loading More...