Digital Footprint Monitoring

Gain an attackers-eye-view of your external-facing infrastructure.

  • Digital Footprint Monitoring

    Digital Footprint Monitoring

    Gain an attackers-eye-view of your external-facing infrastructure.

    Read Report
  • ×

    Interactive Threat Hunting on the Dark Web Webinar

    - Nov 6th -

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 November - Interactive Dark Web
    Thank you!
    Error - something went wrong!
  • Weekly Intelligence Summary 15 Aug - 22 Aug 2019

    Weekly Intelligence Summary 15 Aug - 22 Aug 2019

    Weekly highlights include: An additional 30 organizations were reportedly compromised alongside Capital One in the July 2019 breach; the “Danabot” banking trojan has been targeting financial, retail,

    Read Report
  • Texas Ransomware Outbreaks And Phishing Attacks Using Custom 404 Pages

    Texas Ransomware Outbreaks And Phishing Attacks Using Custom 404 Pages

    Charles Ragland (a brand new ShadowTalk-er!) and Christian Rencken join Harrison this week to discuss an outbreak of ransomware attacks impacting local government entities across Texas. The team...

    Read Post
  • Breach! Exploring the Modern Digital Breach: Part 129:00

    Breach! Exploring the Modern Digital Breach: Part 1

    It seems like we read about new breaches every day. What’s changing? How is exposure and the adoption of digital technology changing the breach landscape? We have a special two-part series where Rick

    Watch Video
  • BlueKeep: Cutting through the hype to prepare your organization

    BlueKeep: Cutting through the hype to prepare your organization

    Over the last week we have all been tuning into our news feeds and listening to the security folks chatting about the next super vulnerability, CVE-2019-0708. There’s no shortage of coverage over the

    Read Post
  • Blog | PowerShell Security Best Practices

    Blog | PowerShell Security Best Practices

    Threat actors have long since used legitimate tools to infiltrate and laterally move across defender’s networks. The reasons for this ...

    Read Post
  • Lessons Learned from Equifax Breach

    Lessons Learned from Equifax Breach

    What can be done to prevent, detect, and mitigate damage to your business and brand as a result of a data breach.

    Read Report
  • GAO’s Equifax Post-mortem Report

    GAO’s Equifax Post-mortem Report

    It’s common for the exciting and novel issues that confront security professionals on a daily basis to be hyped up. ...

    Read Post
  • Episode 34: Satori Botnet, OilRig, PowerShell Security, and the Dragonfly Campaign

    Episode 34: Satori Botnet, OilRig, PowerShell Security, and the Dragonfly Campaign

    Richard Gold and Rose Bernard join Michael Marriott to talked about updates to the Satori botnet, which has expanded to incorporate new IoT devices using TCP port 5555. Amid news of a new wave of...

    Read Post
  • Blog | 2017 Equifax Breach: Impact and Lessons Learned

    Blog | 2017 Equifax Breach: Impact and Lessons Learned

    Equifax experienced a data breach that occurred in mid-May 2017, was first discovered on 29 Jul 2017, and was publicly ...

    Read Post
  • loading
    Loading More...