As GDPR gets ready to take effect, if you have the responsibility for ensuring that your business meets the obligations under GDPR, you are either down the path to compliance or getting serious about making plans. Meanwhile, your legal and privacy teams are worried about how contracts and policies need to change.
Hear from Becky Pinkard, VP of Intel & IT at Digital Shadows, on Security & Privacy in this on-demand webinar.
Other content in this Stream
There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.
See how one large bank detected more than 50,000 exposed credentials in 1 year.
Currently 2.3 billion files are being made publicly available by misconfigured and non-secured technologies used to store this data such as Amazon S3 buckets, Server Message Block (SMB), File Transfer
In this blog series, we’ll share some tales from the front lines – keeping client names anonymous, of course. We’ll investigate some of SearchLight’s most impactful findings, and more importantly, she
Detect sensitive data that's been exposed by employees, contractors, or third parties.
The team starts this week’s episode with a retrospective look at WannaCry, discussing some core lessons learned from this ransomware attack.
The apparent resurgence of advanced persistent threat (APT) group “Naikon” has established that “out of sight” does not mean “inactive”; despite scant reporting on the group in recent years, Naikon ha
Q1 2020 was packed full of significant global events, including military and geopolitical tensions and the onset of the COVID-19 ...
The first half of 2019 has revealed no ebb in the number of massive data breaches and cybersecurity disasters. As the threat landscape continues to evolve and unfortunate enterprises have become the v
Seriously, don’t click back or close – I promise it’s not another one of those “buy all the newest stuff ...
Last week, we learned that millions of Ecuadorian’s personal details had been exposed by a misconfigured ElasticSearch database. This is ...
Asset inventories are one of the most important things to get right. Done correctly, they give you the best insight into your potential attack surface and identify where to focus your efforts.
we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat
In this blog, we determine whether this targeted attack on BriansClub will impact the wider cybercriminal credit carding landscape, and speculate whether it could galvanize the community to push anoth
Honeypots can be useful tools for gathering information on current attack techniques. Conversely, they can be an overwhelming source of ...
One of the most interesting aspects of transitioning from high school history teacher to cyber threat intelligence professional is the ...
What practical steps should organizations and the professionals within them be thinking about in this new world? We have a special two-part series where Rick Holland, VP Intelligence and CISO at Digit
We decided to map this intrusion to the Mitre ATT&CK framework, as we have done previously for:
When the attacker, Andrei Tyurin, pleaded guilty, we thought we could look at the attacker goals, their TTPs and map this to the Mitre PRE-ATT&CK and ATT&CK framework.
We will walk you through each stage of this exploited data cycle to illustrate the economy of exposed credentials, and then present ways you can protect and mitigate the threats targeting your organiz