According to the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) have caused $12 billion in losses since October 2013.1 These scams target businesses and individuals performing wire transfer payments, using social engineering and intrusion techniques to gain access to business email accounts. With financially-sensitive information constantly owing through company emails, these inboxes are lucrative targets for attackers. In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.
Top Cyber Threats to the Retail Sector
Given the frequent number of transactions, retail companies are frequently the target of financially-motiva...
Want To Try Out Our Digital Risk Protection Tool?Get Started Free
Other content in this Stream
Weekly Intelligence Summary 06 Jun - 13 Jun 2019
An indiscriminate malicious cryptocurrency campaign is targeting entities in China using fileless malware techniques, readily available PowerShell exploit tools, and variants of the open-source crypto
Too Much Information: The Sequel | New Research
There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.
A Practical Guide to Reducing Digital Risk
This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.
Digital Risk Protection: Forrester New Wave Report
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
Strategies to Solve the Cyber Talent Gap and Protect Your IT Infrastructure - Recorded Webinar
The cyber talent gap is posing big challenges to enterprises and requires that security leaders implement innovative strategies to bridge the gap. During this informative session, you’ll learn from Ma
Weekly Intelligence Summary 30 May - 06 Jun 2019
Weekly Intelligence Summary 23 May - 30 May 2019
Best Practices Protecting Your Brand Online - Webinar Recording
Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.
A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure
Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.
Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar
The regulatory landscape is rapidly evolving and making it increasingly difficult to effectively respond to cyberattacks and data breaches in order to limit the damages. You’ll hear about the shifting
Why Intelligence Led Learning Helps Security Teams Become Real-World Ready: Recorded Webinar
In this recorded webinar, you will learn what intelligence-led learning is, how intelligence-led learning supports security teams, what the ATT&CK framework is, and its role in intelligence-led learni
Weekly Intelligence Summary 16 May - 23 May 2019
Weekly Intelligence Summary 09 May - 16 May 2019
Weekly Intelligence Summary 02 May - 09 May 2019
The China-affiliated threat group “APT3” has recently been said to develop its own version of a tool that was likely created by the United States NS) prior to being leaked by the “ShadowBrokers”.
Weekly Intelligence Summary 25 Apr - 02 May 2019
Two separate campaigns draw similarities in the use of uncommon and underreported social engineering and delivery mechanisms to compromise a user’s machine with information stealing malware.
Weekly Intelligence Summary 18 Apr - 25 Apr 2019
In the spotlight: Information about APT34, including victim data, personally identifiable information belonging to the group’s alleged members, and the group’s tools, has been leaked on Telegram.
Cyber Risks and High-frequency Trading: Conversation with an Insider
Research from the Carnegie Endowment for International Peace published this week focused the attention on how financial systems around the ...
Weekly Intelligence Summary 11 Apr - 18 Apr 2019
In the spotlight: An unidentified threat actor has obtained data from various personal Outlook, MSN, and Hotmail email accounts by compromising a Microsoft customer support account.
Weekly Intelligence Summary 04 Apr - 11 Apr 2019
“Fin6” has reportedly widened its range of attacks to include ransomware, potentially inciting the threat group to extend targeting beyond retail and hospitality entities.
Weekly Intelligence Summary 28 Mar - 04 Apr 2019