Financial Services

Digital Shadows helps the world’s largest financial institutions manage and remediate their digital risk.

  • Top Cyber Threats to the Financial Services Sector

    Top Cyber Threats to the Financial Services Sector

    The most prevalent cybercrime threats against financial institution are the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking trojans.

    Read Report
  • FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar50:49

    FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar

    Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr

    Watch Video
  • Detecting Exposed Credentials

    Detecting Exposed Credentials

    See how one large bank detected more than 50,000 exposed credentials in 1 year.

    Read Report
  • Thedarkoverlord runs out of Steem

    Thedarkoverlord runs out of Steem

    On 31 December 2018, the notorious extortion actor known as “thedarkoverlord” announced on Twitter and Reddit that they were in ...

    Read Post
  • ×

    Request a
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • Weekly Intelligence Summary: Ep 1

    Weekly Intelligence Summary: Ep 1

    Our main story involves the leak of personal information from several German political parties. We also discuss the other big threat intelligence stories from the week and find out...

    Read Post
  • Bank Discovers Customer Credit Card Numbers Traded Online

    Bank Discovers Customer Credit Card Numbers Traded Online

    Payment card fraud costs banks and merchants nearly $23 billion a year and rising. As consumers spend more money online, ...

    Read Post
  • Read Full Report
  • Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    We cover a range of the different techniques attackers of all persuasions (whether sophisticated nation state or low-level hacker) choose when performing their phishing campaigns.

    Read Post
  • ×

    Join 150k subscribers and get the latest news & threat intel in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • 2019 Cyber Security Forecasts: Six Things on the Horizon

    2019 Cyber Security Forecasts: Six Things on the Horizon

    For this blog, we looked at trends and events that have shaped the digital risk landscape this year and how they might play out in 2019.

    Read Post
  • Digital Risk Protection 2018 Forrester New Wave

    Digital Risk Protection 2018 Forrester New Wave

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Phishing Site Impersonates Financial Services Institution

    Phishing Site Impersonates Financial Services Institution

    If the infamous bank robber, Willie Sutton, were alive today and honed his cyber skills, he might turn his attention ...

    Read Post
  • How to Leverage Threat Intelligence to Protect Against Digital Risks30:01

    How to Leverage Threat Intelligence to Protect Against Digital Risks

    Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab

    Watch Video
  • Digital Risk Management for Financial Services

    Learn More
  • Mitigating the Top 7 Dark Web Threats to Your Enterprise59:01

    Mitigating the Top 7 Dark Web Threats to Your Enterprise

    The dark web continues to pose extremely dangerous threats as cyber criminals coordinate attacks and trade intelligence about your enterprise. Join us for us for an informative session on the 7 most p

    Watch Video
  • Episode 48: Tesco Bank Fraud And £16.4m FCA Fine

    Episode 48: Tesco Bank Fraud And £16.4m FCA Fine

    Two years on from the Tesco Bank fraud attacks that allowed cybercriminals to check out with £2.26m (roughly $3m) in customer funds, Dr Richard Gold and Simon Hall join Rafael Amado to discuss the...

    Read Post
  • 33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    Last week, I wrote about how cybercriminals are looking to trade corporate emails in their pursuit of conducting Business Email ...

    Read Post
  • Bank Discovers Customer Credit Card Numbers Shared And Traded Online

    Bank Discovers Customer Credit Card Numbers Shared And Traded Online

    Digital Shadows helped the SOC Manager of a retail bank discover that customer credit card numbers were being shared on IRC channels.

    Read Report
  • Cryptocurrency - The New Gold Rush for Cybercriminals

    Cryptocurrency - The New Gold Rush for Cybercriminals

    Cybercriminals have developed several schemes to defraud those looking to profit from the growth in cryptocurrencies.

    Read Report
  • Inside Online Carding Courses Designed for Cybercriminals

    Inside Online Carding Courses Designed for Cybercriminals

    Digital Shadows lifts the lid on sophisticated Russian language e-learning credit card fraud courses.

    Read Report
  • Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework

    Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework

    Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it calls the “Essential 8”: a set ...

    Read Post
  • Cybercriminals on the Outlook for Your Emails

    Cybercriminals on the Outlook for Your Emails

    In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.

    Read Report
  • Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework

    Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework

    We took our recent work on the Mitre ATT&CK framework and various indictments of cyber criminals and nation state actors and mapped them to the Essential 8 framework.

    Read Report
  • loading
    Loading More...