In this O’Reilly report, authors Greg Fell and Mike Barlow explore both the benign and malevolent activities of the dark net, and the dark web, to explain the surprising origin of the dark net, how criminals use the dark net to steal and store vital information, and how you can patrol this not-so-secret domain to detect and thwart intruders.
Error - something went wrong!
Lessons Learned from Equifax Breach
What can be done to prevent, detect, and mitigate damage to your business and brand as a result of a data b...
Error - something went wrong!
Other content in this Stream
Too Much Information: The Sequel | New Research
There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.
2.3 billion files exposed across online file storage technologies
Currently 2.3 billion files are being made publicly available by misconfigured and non-secured technologies used to store this data such as Amazon S3 buckets, Server Message Block (SMB), File Transfer
Data Loss Detection Overview
SearchLight enables you to detect Employee Credentials, Sensitive Documents and Technical Information, Intellectual Property, and Customer Data
Detecting Exposed Credentials | Case Study
See how one large bank detected more than 50,000 exposed credentials in 1 year.
How to Detect Data Loss with Digital Shadows SearchLight™
Detect exposed credentials, sensitive documents, proprietary code, intellectual property, and customer data. Learn more at https://www.digitalshadows.com/digital-risk-solutions/data-loss-detection/.
Detecting Exposed Company Data: The What, Why, and How
What is data loss detection? A fundamental responsibility for any IT security professional is to secure their information assets, be ...
Leaky SMB File Shares – So Many Bytes!
Everyone loves a sequel. If you’re an avid Marvel fan, you’re probably sitting on the edge of your seat waiting ...
A Practical Guide to Reducing Digital Risk
This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.
A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure
Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.
Weekly Intelligence Summary 13 Jun - 20 Jun 2019
In the spotlight this week is a cyber-threat campaign involving the abuse of legitimate features in Google Calendar.
SingHealth Breach Post-mortem: Key Findings
On 10 January 2019, Singaporean authorities finally released a report detailing how the attack against Singapore’s largest group of healthcare ...
Digital Risk: The C-Suite's Critical Missing Part of Overall Risk
In this report, you will learn the emergence of Digital Risk Protection, a framework for protecting against Digital Risks, questions the C-Suite should be asking.
Security Practitioner’s Guide to Email Spoofing and Risk Reduction
In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we ...
FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar
Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr
Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files
Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.
Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It
We cover a range of the different techniques attackers of all persuasions (whether sophisticated nation state or low-level hacker) choose when performing their phishing campaigns.
Episode 54: Marriott Breach And 2019 Trends
Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott data breach, as well as a look forward to trends we might see in 2019. Specifically, we dig...
81,000 Hacked Facebook Accounts for Sale: 5 Things to Know
With so much confusion around the origins of these accounts and the potential impact on Facebook users, here are five things to know that will help you cut through the noise.
Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online
VIPs and executives who are critical to your company and brand can be targeted by threat actors or groups who ...
How to Leverage Threat Intelligence to Protect Against Digital Risks