With over 1,442 cryptocurrencies in circulation, and new alternative coins – “altcoins” – emerging every week, cybercriminals have developed several schemes to defraud those looking to profit from the growth in cryptocurrencies.

×
Request a
Live Demo
Thank You
Error - something went wrong!
Other content in this Stream
Top Cyber Threats to the Financial Services Sector
The most prevalent cybercrime threats against financial institution are the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking trojans.

A Practical Guide to Reducing Digital Risk
This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

Digital Risk: The C-Suite's Critical Missing Part of Overall Risk
In this report, you will learn the emergence of Digital Risk Protection, a framework for protecting against Digital Risks, questions the C-Suite should be asking.

FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar
Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr

Detecting Exposed Credentials
See how one large bank detected more than 50,000 exposed credentials in 1 year.

Weekly Intelligence Summary: Ep 4
This week, Alex Guirakhoo and Jamie Collier join Harrison to discuss APT39, a new Iran-linked espionage group, as well as other highlights from this week involving updated information about...

Thedarkoverlord runs out of Steem
On 31 December 2018, the notorious extortion actor known as “thedarkoverlord” announced on Twitter and Reddit that they were in ...

Bank Discovers Customer Credit Card Numbers Traded Online
Payment card fraud costs banks and merchants nearly $23 billion a year and rising. As consumers spend more money online, ...

Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It
We cover a range of the different techniques attackers of all persuasions (whether sophisticated nation state or low-level hacker) choose when performing their phishing campaigns.

2019 Cyber Security Forecasts: Six Things on the Horizon
For this blog, we looked at trends and events that have shaped the digital risk landscape this year and how they might play out in 2019.

Digital Risk Protection 2018 Forrester New Wave
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

Phishing Site Impersonates Financial Services Institution
If the infamous bank robber, Willie Sutton, were alive today and honed his cyber skills, he might turn his attention ...

How to Leverage Threat Intelligence to Protect Against Digital Risks
Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab

Mitigating the Top 7 Dark Web Threats to Your Enterprise
The dark web continues to pose extremely dangerous threats as cyber criminals coordinate attacks and trade intelligence about your enterprise. Join us for us for an informative session on the 7 most p

Episode 48: Tesco Bank Fraud And £16.4m FCA Fine
Two years on from the Tesco Bank fraud attacks that allowed cybercriminals to check out with £2.26m (roughly $3m) in customer funds, Dr Richard Gold and Simon Hall join Rafael Amado to discuss the...

33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy
Last week, I wrote about how cybercriminals are looking to trade corporate emails in their pursuit of conducting Business Email ...
Bank Discovers Customer Credit Card Numbers Shared And Traded Online
Digital Shadows helped the SOC Manager of a retail bank discover that customer credit card numbers were being shared on IRC channels.
Inside Online Carding Courses Designed for Cybercriminals
Digital Shadows lifts the lid on sophisticated Russian language e-learning credit card fraud courses.

Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework
Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it calls the “Essential 8”: a set ...

Cybercriminals on the Outlook for Your Emails