Data Loss Detection

Reduce the amount of information available for reconnaissance or corporate espionage.

  • Too Much Information: The Sequel | New Research

    Too Much Information: The Sequel | New Research

    There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.

    Read Report
  • Check out our Weekly Intelligence Summary

    Access Here
  • SecDevOps: Continued Database Exposures Point to Growing Challenges

    SecDevOps: Continued Database Exposures Point to Growing Challenges

    Last week, we learned that millions of Ecuadorian’s personal details had been exposed by a misconfigured ElasticSearch database. This is ...

    Read Post
  • Your Data at Risk – Emerging Cyber Threats to Your Enterprise with the FBI Cyber Division56:13

    Your Data at Risk – Emerging Cyber Threats to Your Enterprise with the FBI Cyber Division

    The first half of 2019 has revealed no ebb in the number of massive data breaches and cybersecurity disasters. As the threat landscape continues to evolve and unfortunate enterprises have become the v

    Watch Video
  • Data Leakage Detection

    Data Leakage Detection

    Detect sensitive data that's been exposed by employees, contractors, or third parties.

    Read Report
  • ANU Breach Report: Mapping to Mitre ATT&CK Framework

    ANU Breach Report: Mapping to Mitre ATT&CK Framework

    We decided to map this intrusion to the Mitre ATT&CK framework, as we have done previously for:

    Read Post
  • Detecting Exposed Credentials | Case Study

    Detecting Exposed Credentials | Case Study

    See how one large bank detected more than 50,000 exposed credentials in 1 year.

    Read Report
  • ×

    Threat Intel Fan?

    Sign up for our TI and security email updates!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • The Tyurin Indictment- Mapping To The Mitre ATT&CK™ Framework

    The Tyurin Indictment- Mapping To The Mitre ATT&CK™ Framework

    Director of Security Engineering, Richard Gold, joins Viktoria Austin in this special episode of ShadowTalk to look at the attacker goals, their TTPs, and map this to the Mitre PRE-ATT&CK and...

    Read Post
  • Weekly Intelligence Summary 03 Oct - 10 Oct 2019

    Weekly Intelligence Summary 03 Oct - 10 Oct 2019

    In the spotlight this week is the Iran-linked threat group “APT35”, which took aim at the email accounts of political entities in the United States and prominent Iranians living outside Iran.

    Read Report
  • Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence

    Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence

    We’re back in London this week! Viktoria chats with Adam Cook, Philip Doherty, and Josh Poole on this week’s top stories. - APT35 Targets Email of US political figures & prominent Iranians -...

    Read Post
  • Breach! Exploring the Modern Digital Breach: Part 228:13

    Breach! Exploring the Modern Digital Breach: Part 2

    What practical steps should organizations and the professionals within them be thinking about in this new world? We have a special two-part series where Rick Holland, VP Intelligence and CISO at Digit

    Watch Video
  • Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework

    Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework

    When the attacker, Andrei Tyurin, pleaded guilty, we thought we could look at the attacker goals, their TTPs and map this to the Mitre PRE-ATT&CK and ATT&CK framework.

    Read Post
  • Harnessing Exposed Data to Enhance Cyber Intelligence

    Harnessing Exposed Data to Enhance Cyber Intelligence

    We will walk you through each stage of this exploited data cycle to illustrate the economy of exposed credentials, and then present ways you can protect and mitigate the threats targeting your organiz

    Read Post
  • ×

    Interactive Threat Hunting on the Dark Web Webinar

    - Nov 6th -

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 November - Interactive Dark Web
    Thank you!
    Error - something went wrong!
  • Data Loss Detection Overview

    Data Loss Detection Overview

    SearchLight enables you to detect Employee Credentials, Sensitive Documents and Technical Information, Intellectual Property, and Customer Data

    Read Report
  • Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar42:41

    Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar

    Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circula

    Watch Video
  • Two-Factor in Review

    Two-Factor in Review

    A technical assessment of the most popular mitigation for account takeover attacks

    Read Report
  • Marriott Faces GDPR Fines - A DPO and CISO Discussion

    Marriott Faces GDPR Fines - A DPO and CISO Discussion

    Harrison (@pseudohvr) is joined by Digital Shadows co-founder and Data Privacy Officer, James Chappell (@jimmychappell), as well as CISO Rick Holland (@rickhholland), to discuss the news this week...

    Read Post
  • 2.3 billion files exposed across online file storage technologies

    2.3 billion files exposed across online file storage technologies

    Currently 2.3 billion files are being made publicly available by misconfigured and non-secured technologies used to store this data such as Amazon S3 buckets, Server Message Block (SMB), File Transfer

    Read Post
  • Detecting Exposed Company Data: The What, Why, and How

    Detecting Exposed Company Data: The What, Why, and How

    What is data loss detection? A fundamental responsibility for any IT security professional is to secure their information assets, be ...

    Read Post
  • Leaky SMB File Shares – So Many Bytes!

    Leaky SMB File Shares – So Many Bytes!

    Everyone loves a sequel. If you’re an avid Marvel fan, you’re probably sitting on the edge of your seat waiting ...

    Read Post
  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • loading
    Loading More...