According to the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) have caused $12 billion in losses since October 2013.1 These scams target businesses and individuals performing wire transfer payments, using social engineering and intrusion techniques to gain access to business email accounts. With financially-sensitive information constantly owing through company emails, these inboxes are lucrative targets for attackers. In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.
Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it c...
Other content in this Stream
The most prevalent cybercrime threats against financial institution are the use or sale of ATM malware, targeted network intrusions, data breaches and the use of banking trojans.
See how one large bank detected more than 50,000 exposed credentials in 1 year.
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
Following a likely ransomware attack targeting the Czech Republic’s second-largest hospital, the Czech National Cyber and Information Security Agency (NÚKIB/NCISA) released a warning detailing the imm
Alex, Kacey, Charles, and Harrison host this week’s ShadowTalk for threat intel updates including Maze ransomware updates, a warning of an imminent threat from the Czech NCISA, priorities for third pa
Asset and wealth management companies across the world work with Digital Shadows to secure their brands, detect data loss, and reduce their attack surface.
Coming to you from Dallas this week - we have Kacey, Harrison, Alex, and Charles. This week the team talks through third party app risks as they relate to COVID-19, as well as touch on security...
In this blog series, we’ll share some tales from the front lines – keeping client names anonymous, of course. We’ll investigate some of SearchLight’s most impactful findings, and more importantly, she
The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can ...
On Monday, January 13th, Brian Krebs reported that Microsoft would be releasing “a software update on Tuesday to fix ...
In this blog, we discuss several significant trends and events that have helped shape the cyber threat landscape, all of which will almost certainly continue through 2020.
The survival of the cybercriminal forum in the face of new, more secure technologies and constant pressure from law enforcement does not come as a surprise to researchers at Digital Shadows.
See how one global retailer detected almost 2,000 domains impersonating their brand.
Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a ...
Part 2 looks at cybercriminal forum users’ resistance to moving away from the forum model.
This blog seeks to rebalance intelligence tradecraft discussions by highlighting some of the less glamorous everyday sources of bias that are too often overlooked.
Criminals are conducting Black Friday sales amongst themselves, many of which are on the dark web.
If an attacker had all my credit card information, would this 2FA solution prevent it from being used illegitimately?
Cybercriminals have developed several schemes to defraud those looking to profit from the growth in cryptocurrencies.
we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat