Data Loss Detection

Reduce the amount of information available for reconnaissance or corporate espionage.

  • Data Loss Detection

    Data Loss Detection

    SearchLight enables you to detect Employee Credentials, Sensitive Documents and Technical Information, Intellectual Property, and Customer Data

    Read Report
  • Identify & Remediate Data Loss

    Request a Demo
  • ×

    Live Webinar w/
    Immersive Labs:

    Why Intelligence Led Learning Helps Security Teams

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 February - Immersive Labs Webinar Session
    Thank you!
    Error - something went wrong!
  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • Digital Risk: The C-Suite's Critical Missing Part of Overall Risk

    Digital Risk: The C-Suite's Critical Missing Part of Overall Risk

    In this report, you will learn the emergence of Digital Risk Protection, a framework for protecting against Digital Risks, questions the C-Suite should be asking.

    Read Report
  • Detecting Exposed Credentials

    Detecting Exposed Credentials

    See how one large bank detected more than 50,000 exposed credentials in 1 year.

    Read Report
  • SingHealth Breach Post-mortem: Key Findings

    SingHealth Breach Post-mortem: Key Findings

    On 10 January 2019, Singaporean authorities finally released a report detailing how the attack against Singapore’s largest group of healthcare ...

    Read Post
  • Security Practitioner’s Guide to Email Spoofing and Risk Reduction

    Security Practitioner’s Guide to Email Spoofing and Risk Reduction

    In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we ...

    Read Post
  • ×

    Join 150k subscribers and get the latest news & threat intel in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.

    Read Report
  • Weekly Intelligence Summary: Ep 4

    Weekly Intelligence Summary: Ep 4

    This week, Alex Guirakhoo and Jamie Collier join Harrison to discuss APT39, a new Iran-linked espionage group, as well as other highlights from this week involving updated information about...

    Read Post
  • FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar50:49

    FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar

    Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr

    Watch Video
  • Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    We cover a range of the different techniques attackers of all persuasions (whether sophisticated nation state or low-level hacker) choose when performing their phishing campaigns.

    Read Post
  • Episode 54: Marriott Breach And 2019 Trends

    Episode 54: Marriott Breach And 2019 Trends

    Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott data breach, as well as a look forward to trends we might see in 2019. Specifically, we dig...

    Read Post
  • 81,000 Hacked Facebook Accounts for Sale: 5 Things to Know

    81,000 Hacked Facebook Accounts for Sale: 5 Things to Know

    With so much confusion around the origins of these accounts and the potential impact on Facebook users, here are five things to know that will help you cut through the noise.

    Read Post
  • Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online

    Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online

    VIPs and executives who are critical to your company and brand can be targeted by threat actors or groups who ...

    Read Post
  • How to Leverage Threat Intelligence to Protect Against Digital Risks30:01

    How to Leverage Threat Intelligence to Protect Against Digital Risks

    Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab

    Watch Video
  • To Pay or Not to Pay: A Large Retailer Responds to DDoS Extortion

    To Pay or Not to Pay: A Large Retailer Responds to DDoS Extortion

    Fans of The Sopranos or Goodfellas are well-versed in the world of extortion. Whether it is paying off Tony Soprano ...

    Read Post
  • Episode 55: Tackling Phishing

    Episode 55: Tackling Phishing

    Simon Hall and Richard Gold join Rafael Amado to wade in on the topic of phishing. By looking at details revealed in law enforcement indictments against nation state and organized criminal groups,...

    Read Post
  • Cybercriminals on the Outlook for Your Emails

    Cybercriminals on the Outlook for Your Emails

    In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.

    Read Report
  • Bank Discovers Customer Credit Card Numbers Shared And Traded Online

    Bank Discovers Customer Credit Card Numbers Shared And Traded Online

    Digital Shadows helped the SOC Manager of a retail bank discover that customer credit card numbers were being shared on IRC channels.

    Read Report
  • 33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    Last week, I wrote about how cybercriminals are looking to trade corporate emails in their pursuit of conducting Business Email ...

    Read Post
  • Episode 48: Tesco Bank Fraud And £16.4m FCA Fine

    Episode 48: Tesco Bank Fraud And £16.4m FCA Fine

    Two years on from the Tesco Bank fraud attacks that allowed cybercriminals to check out with £2.26m (roughly $3m) in customer funds, Dr Richard Gold and Simon Hall join Rafael Amado to discuss the...

    Read Post
  • loading
    Loading More...