Banks face increased pressures to strategically balance the personal relationships with consumers and businesses and at the same time, embrace new technologies that make their services and products readily available to their customers from anywhere and at any time. Financially-motivated threat actors target banks large and small to monetize their sensitive data and assets, jeopardizing business loyalty and customer trust in addition to revenue. In this use case, we will share how our services enabled a regional bank to detect and mitigate these attacks before they impacted their business, brand and reputation.
Home » Data Loss Detection » Regional Bank Customers at Risk Due to Data Loss and Payment Card Fraud
How ADP Manages 3rd Party & Supply Chain Risk
Recorded webcast with Guest Speaker V.Jay LaRosa from ADP discussing best practices mitigating cyber risks ...
Error - something went wrong!
Other content in this Stream
Data Loss Detection
SearchLight enables you to detect Employee Credentials, Sensitive Documents and Technical Information, Intellectual Property, and Customer Data
Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files
Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.
FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar
Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr
Detecting Exposed Credentials
See how one large bank detected more than 50,000 exposed credentials in 1 year.
Weekly Intelligence Summary: Ep 1
Our main story involves the leak of personal information from several German political parties. We also discuss the other big threat intelligence stories from the week and find out...
Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It
We cover a range of the different techniques attackers of all persuasions (whether sophisticated nation state or low-level hacker) choose when performing their phishing campaigns.
Episode 54: Marriott Breach And 2019 Trends
Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott data breach, as well as a look forward to trends we might see in 2019. Specifically, we dig...
81,000 Hacked Facebook Accounts for Sale: 5 Things to Know
With so much confusion around the origins of these accounts and the potential impact on Facebook users, here are five things to know that will help you cut through the noise.
Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online
VIPs and executives who are critical to your company and brand can be targeted by threat actors or groups who ...
How to Leverage Threat Intelligence to Protect Against Digital Risks
Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab
To Pay or Not to Pay: A Large Retailer Responds to DDoS Extortion
Fans of The Sopranos or Goodfellas are well-versed in the world of extortion. Whether it is paying off Tony Soprano ...
Episode 55: Tackling Phishing
Simon Hall and Richard Gold join Rafael Amado to wade in on the topic of phishing. By looking at details revealed in law enforcement indictments against nation state and organized criminal groups,...
Cybercriminals on the Outlook for Your Emails
In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.
33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy
Last week, I wrote about how cybercriminals are looking to trade corporate emails in their pursuit of conducting Business Email ...
The Dark Web: Marketers’ Trick or Threat Intelligence Treat?
While the dark web is overhyped, it’s not all a load of hocus pocus. Nevertheless, you shouldn’t be waiting until data is offered for sale on the dark web – there’s plenty you can be doing to prev...
Episode 48: Tesco Bank Fraud And £16.4m FCA Fine
Two years on from the Tesco Bank fraud attacks that allowed cybercriminals to check out with £2.26m (roughly $3m) in customer funds, Dr Richard Gold and Simon Hall join Rafael Amado to discuss the...
Cyber Security Awareness Month: Week 3 – It’s Everyone’s Job to Ensure Online Safety at Work
This week, National Cyber Security Awareness Month (NCSAM) focuses on accountability and responsibility within the information security space: “It’s Everyone’s ...
How ADP Manages 3rd Party & Supply Chain Risk
Recorded webcast with Guest Speaker V.Jay LaRosa from ADP discussing best practices mitigating cyber risks from complex service delivery ecosystems.
Digital Risk Protection 2018 Forrester New Wave
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions