Digital Shadows helps a security manager of a large technology company find that 5,000 employee pay stubs were publicly available online.
Home » Data Loss Detection » Digital Shadows Detects and Removes Publicly Accessible Employee Pay Stubs
Digital Shadows finds 1.5 billion business and consumer files exposed online
Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month prior to GDPR...
Error - something went wrong!
Other content in this Stream
Too Much Information: The Sequel | New Research
There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.
SecDevOps: Continued Database Exposures Point to Growing Challenges
Last week, we learned that millions of Ecuadorian’s personal details had been exposed by a misconfigured ElasticSearch database. This is ...
Your Data at Risk – Emerging Cyber Threats to Your Enterprise with the FBI Cyber Division
The first half of 2019 has revealed no ebb in the number of massive data breaches and cybersecurity disasters. As the threat landscape continues to evolve and unfortunate enterprises have become the v
Data Leakage Detection
Detect sensitive data that's been exposed by employees, contractors, or third parties.
ANU Breach Report: Mapping to Mitre ATT&CK Framework
We decided to map this intrusion to the Mitre ATT&CK framework, as we have done previously for:
Detecting Exposed Credentials | Case Study
See how one large bank detected more than 50,000 exposed credentials in 1 year.
The Tyurin Indictment- Mapping To The Mitre ATT&CK™ Framework
Director of Security Engineering, Richard Gold, joins Viktoria Austin in this special episode of ShadowTalk to look at the attacker goals, their TTPs, and map this to the Mitre PRE-ATT&CK and...
Weekly Intelligence Summary 03 Oct - 10 Oct 2019
In the spotlight this week is the Iran-linked threat group “APT35”, which took aim at the email accounts of political entities in the United States and prominent Iranians living outside Iran.
Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence
We’re back in London this week! Viktoria chats with Adam Cook, Philip Doherty, and Josh Poole on this week’s top stories. - APT35 Targets Email of US political figures & prominent Iranians -...
Breach! Exploring the Modern Digital Breach: Part 2
What practical steps should organizations and the professionals within them be thinking about in this new world? We have a special two-part series where Rick Holland, VP Intelligence and CISO at Digit
Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework
When the attacker, Andrei Tyurin, pleaded guilty, we thought we could look at the attacker goals, their TTPs and map this to the Mitre PRE-ATT&CK and ATT&CK framework.
Harnessing Exposed Data to Enhance Cyber Intelligence
We will walk you through each stage of this exploited data cycle to illustrate the economy of exposed credentials, and then present ways you can protect and mitigate the threats targeting your organiz
Data Loss Detection Overview
SearchLight enables you to detect Employee Credentials, Sensitive Documents and Technical Information, Intellectual Property, and Customer Data
Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar
Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circula
Two-Factor in Review
A technical assessment of the most popular mitigation for account takeover attacks
Marriott Faces GDPR Fines - A DPO and CISO Discussion
Harrison (@pseudohvr) is joined by Digital Shadows co-founder and Data Privacy Officer, James Chappell (@jimmychappell), as well as CISO Rick Holland (@rickhholland), to discuss the news this week...
2.3 billion files exposed across online file storage technologies
Currently 2.3 billion files are being made publicly available by misconfigured and non-secured technologies used to store this data such as Amazon S3 buckets, Server Message Block (SMB), File Transfer
Detecting Exposed Company Data: The What, Why, and How
What is data loss detection? A fundamental responsibility for any IT security professional is to secure their information assets, be ...
Leaky SMB File Shares – So Many Bytes!
Everyone loves a sequel. If you’re an avid Marvel fan, you’re probably sitting on the edge of your seat waiting ...
A Practical Guide to Reducing Digital Risk