According to the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) have caused $12 billion in losses since October 2013.1 These scams target businesses and individuals performing wire transfer payments, using social engineering and intrusion techniques to gain access to business email accounts. With financially-sensitive information constantly owing through company emails, these inboxes are lucrative targets for attackers. In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.
Top Cyber Threats to the Retail Sector
Given the frequent number of transactions, retail companies are frequently the target of financially-motiva...
Try SearchLight Free
for 7 Days
Other content in this Stream
Weekly Intelligence Summary 07 Feb - 14 Feb 2019
Weekly Intelligence Summary 31 Jan - 07 Feb 2019
Highlights from the week include: a spam campaign targeting American users, distributing the “Trickbot” banking trojan; Vietnamese threat group “OceanLotus” deploying a new custom downloader; and ...
A Practical Guide to Reducing Digital Risk
This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.
Digital Risk: The C-Suite's Critical Missing Part of Overall Risk
In this report, you will learn the emergence of Digital Risk Protection, a framework for protecting against Digital Risks, questions the C-Suite should be asking.
Weekly Intelligence Summary 24 Jan - 31 Jan 2019
In the spotlight this week, security researchers have published details on “APT39”, a suspected Iran-associated cyber espionage group.
Digital Risk Protection 2018 Forrester New Wave
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
Weekly Intelligence Summary 17 Jan - 24 Jan 2019
Highlights from the week include: DarkHydrus were observed using a new method to communicate with command and control servers, technology and social networking companies continue to remove ...
Detecting Spoof Domains - Domain Infringement
See how one global retailer detected almost 2,000 domains impersonating their brand.
Online Brand Security
Cybercriminals impersonate your brand by registering spoof domains, social media accounts, and mobile applications. SearchLight enables you to detect Domain Impersonation, Malicious Mobile Apps...
Attack Surface Reduction
As your infrastructure grows and becomes more complex, it can be difficult to keep up with expanding attack surfaces. Attackers are aware of this and frequently look to exploit public-facing app...
Data Loss Detection
SearchLight enables you to detect Employee Credentials, Sensitive Documents and Technical Information, Intellectual Property, and Customer Data
Digital Shadows SearchLight™
Digital Shadows SearchLight™ helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface.
Weekly Intelligence Summary 10 Jan - 17 Jan 2019
Highlights from the week include: The threat group “TA505” has been attributed with three new phishing campaigns from November and December 2018; a wave of Domain Name System (DNS) hijacking attacks t
Weekly Intelligence Summary 03 Jan - 10 Jan 2019
Highlights from the week include: a new data skimming campaign attributed to the threat group “Magecart”, a security researcher’s phishing-campaign tool that can bypass two-factor authentication (2FA)
FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar
Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr
Shadow Search speeds up the security operations process, quickly enabling deeper research and faster investigation for threat intelligence and security teams.
ERP Applications Under Fire
The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what
Top Cyber Threats to the Healthcare & Pharmaceutical Sector
There is no shortage of cyber threats against the lucrative health care, medical device and pharmaceutical sectors. Discover the top cyber threats to these industries.
7 Ways the Digital Risk Revolution Changes Risk and Compliance
CTO and co-founder of Digital Shadows joins VP of Development at Lockpath for a webinar around how the digital risk revolution changes risk and compliance.
Top Cyber Threats to the Legal Sector