Financial Services
Digital Shadows helps the world’s largest financial institutions manage and remediate their digital risk.
-
Threats to Asset and Wealth Management in 2020-2021
If you work in the asset and wealth management industry and are concerned with proactively avoiding a data breach and the reputational and financial damages that come with it, here are the top 2021..
-
Nightmare Market In Disarray And SEC Investigation Into Data Leak At First American Financial Corp
Harrison is back! Alex and Christian join this week to discuss how Black Hat and DEFCON went last week, analyze the irregularities of the dark web criminal market, Nightmare, and explore the story...
-
How Digital Shadows Helped Find and Remediate an Exposed Admin Password on Github
In this blog series, we’ll share some tales from the front lines – keeping client names anonymous, of course. We’ll investigate some of SearchLight’s most impactful findings, and more importantly, she
-
How One Large Bank Detected More Than 50,000 Exposed Credentials in 1 Year | Case Study
See how one large bank detected more than 50,000 exposed credentials in 1 year.
-
SearchLight’s Exposed Document Alerts: Uncover the Critical, Faster
BACKING UP…INTO A DITCH I am a terrible driver. While I’ve sat through Driver’s Ed courses, studied physics and trigonometry, ...
-
Reducing technical leakage: Detecting software exposure from the outside-in
A combination of the rapid delivery of software, onset of digital transformation, and poor security practices, have increased the likelihood of sensitive technical data being exposed online.
-
Top Cyber Threats to the Financial Services Sector
The most prevalent cybercrime threats against financial institution are the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking trojans.
-
Third Party Risk: 4 ways to manage your security ecosystem
Don’t assume your data is safe because you’ve completed a vendor risk questionnaire, or the third-party has a promising risk score. Data finds a way online. Find a way to detect it when it does.
-
Account takeover: Expanding on impact
Digital Shadows has collected over 15 billion credentials across the open, deep, and dark web.
-
Let’s get ready to tumble! Bitcoin vs Monero
Over the past ten years, cryptocurrencies have become the go-to form of payment for the less law-abiding citizens of the ...
-
The Rise of OpenBullet: A Deep Dive in the Attacker’s ATO toolkit
Account takeover (ATO) has become a serious issue for many organizations. Digital Shadows has identified over 15 billion credentials circulating ...
-
From Exposure to Takeover: Part 1. Beg, borrow, and steal your way in
Account Takeover: Why criminals can’t resist We rely on passwords to safeguard those precious accounts that allow us to conduct ...
-
Digital Shadows for Asset and Wealth Management
Asset and wealth management companies across the world work with Digital Shadows to secure their brands, detect data loss, and reduce their attack surface.
-
NSA Vulnerability Disclosure: Pros and Cons
On Monday, January 13th, Brian Krebs reported that Microsoft would be releasing “a software update on Tuesday to fix ...
-
2020 Cybersecurity Forecasts: 5 trends and predictions for the new year
In this blog, we discuss several significant trends and events that have helped shape the cyber threat landscape, all of which will almost certainly continue through 2020.
-
Quarterly Update: Ransomware Trends in Q3
As we embark on the final months of 2020, ransomware has been the main topic of conversation once again. Throughout ...
-
Forums are Forever – Part 1: Cybercrime Never Dies
The survival of the cybercriminal forum in the face of new, more secure technologies and constant pressure from law enforcement does not come as a surprise to researchers at Digital Shadows.
-
Threat Intelligence: A Deep Dive
Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a ...
-
Forums are Forever – Part 2: Shaken, but not Stirred
Part 2 looks at cybercriminal forum users’ resistance to moving away from the forum model.
-
A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias
This blog seeks to rebalance intelligence tradecraft discussions by highlighting some of the less glamorous everyday sources of bias that are too often overlooked.
-
Loading More...