Financial Services

Digital Shadows helps the world’s largest financial institutions manage and remediate their digital risk.

  • Top Cyber Threats to the Financial Services Sector

    Top Cyber Threats to the Financial Services Sector

    The most prevalent cybercrime threats against financial institution are the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking trojans.

    Read Report
  • Resources for Your Team during the Coronavirus Pandemic

    Take Me There
  • Ransomware Trends in Q3
    On-demand Webinar

    Watch Here
  • Quarterly Update: Ransomware Trends in Q3

    Quarterly Update: Ransomware Trends in Q3

    As we embark on the final months of 2020, ransomware has been the main topic of conversation once again. Throughout ...

    Read Post
  • Let’s get ready to tumble! Bitcoin vs Monero

    Let’s get ready to tumble! Bitcoin vs Monero

    Over the past ten years, cryptocurrencies have become the go-to form of payment for the less law-abiding citizens of the ...

    Read Post
  • Account takeover: Expanding on impact

    Account takeover: Expanding on impact

    Digital Shadows has collected over 15 billion credentials across the open, deep, and dark web.

    Read Post
  • ×

    Request a
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • The Rise of OpenBullet: A Deep Dive in the Attacker’s ATO toolkit

    The Rise of OpenBullet: A Deep Dive in the Attacker’s ATO toolkit

    Account takeover (ATO) has become a serious issue for many organizations. Digital Shadows has identified over 15 billion credentials circulating ...

    Read Post
  • From Exposure to Takeover: Part 1. Beg, borrow, and steal your way in

    From Exposure to Takeover: Part 1. Beg, borrow, and steal your way in

    Account Takeover: Why criminals can’t resist We rely on passwords to safeguard those precious accounts that allow us to conduct ...

    Read Post
  • Discover why we’re named a "Leader" in Digital Risk Protection

    Forrester Report
  • How One Large Bank Detected More Than 50,000 Exposed Credentials in 1 Year | Case Study

    How One Large Bank Detected More Than 50,000 Exposed Credentials in 1 Year | Case Study

    See how one large bank detected more than 50,000 exposed credentials in 1 year.

    Read Report
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Forrester New Wave Report: Digital Risk Protection

    Forrester New Wave Report: Digital Risk Protection

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Digital Shadows for Asset and Wealth Management

    Digital Shadows for Asset and Wealth Management

    Asset and wealth management companies across the world work with Digital Shadows to secure their brands, detect data loss, and reduce their attack surface.

    Read Report
  • Reducing technical leakage: Detecting software exposure from the outside-in

    Reducing technical leakage: Detecting software exposure from the outside-in

    Modern Development Practices Leads to Increased Exposure As customers, we can be a bit demanding when it comes to technology ...

    Read Post
  • How Digital Shadows Helped Find and Remediate an Exposed Admin Password on Github

    How Digital Shadows Helped Find and Remediate an Exposed Admin Password on Github

    In this blog series, we’ll share some tales from the front lines – keeping client names anonymous, of course. We’ll investigate some of SearchLight’s most impactful findings, and more importantly, she

    Read Post
  • ×

    2021 Cybersecurity Forecasts: Trends and Predictions for the New Year

    - December 09 -
    Live Webinar

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2020Dec09 - Predictions Webinar
    Thank you!
    Error - something went wrong!
  • Third Party Risk: 4 ways to manage your security ecosystem

    Third Party Risk: 4 ways to manage your security ecosystem

      The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can ...

    Read Post
  • NSA Vulnerability Disclosure: Pros and Cons

    NSA Vulnerability Disclosure: Pros and Cons

      On Monday, January 13th, Brian Krebs reported that Microsoft would be releasing “a software update on Tuesday to fix ...

    Read Post
  • 2020 Cybersecurity Forecasts: 5 trends and predictions for the new year

    2020 Cybersecurity Forecasts: 5 trends and predictions for the new year

    In this blog, we discuss several significant trends and events that have helped shape the cyber threat landscape, all of which will almost certainly continue through 2020.

    Read Post
  • Forums are Forever – Part 1: Cybercrime Never Dies

    Forums are Forever – Part 1: Cybercrime Never Dies

    The survival of the cybercriminal forum in the face of new, more secure technologies and constant pressure from law enforcement does not come as a surprise to researchers at Digital Shadows.

    Read Post
  • How One Global Retailer Detected Almost 2,000 Spoof Domains | Case Study

    How One Global Retailer Detected Almost 2,000 Spoof Domains | Case Study

    See how one global retailer detected almost 2,000 domains impersonating their brand.

    Read Report
  • Threat Intelligence: A Deep Dive

    Threat Intelligence: A Deep Dive

      Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a ...

    Read Post
  • Forums are Forever – Part 2: Shaken, but not Stirred

    Forums are Forever – Part 2: Shaken, but not Stirred

    Part 2 looks at cybercriminal forum users’ resistance to moving away from the forum model.

    Read Post
  • A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias

    A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias

    This blog seeks to rebalance intelligence tradecraft discussions by highlighting some of the less glamorous everyday sources of bias that are too often overlooked.

    Read Post
  • Black Friday Deals on the Dark Web: A cybercriminal shopper’s paradise

    Black Friday Deals on the Dark Web: A cybercriminal shopper’s paradise

    Criminals are conducting Black Friday sales amongst themselves, many of which are on the dark web.

    Read Post
  • loading
    Loading More...