With over 1,442 cryptocurrencies in circulation, and new alternative coins – “altcoins” – emerging every week, cybercriminals have developed several schemes to defraud those looking to profit from the growth in cryptocurrencies.
Error - something went wrong!
Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files
Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before busine...
Error - something went wrong!
Other content in this Stream
Digital Risk Protection: Forrester New Wave Report
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
Weekly Intelligence Summary 11 Jul - 18 Jul 2019
Entering the spotlight this week is the new “DoppelPaymer” ransomware, which bears resemblance to the “Indrik Spider”-associated “BitPaymer” ransomware.
ShadowTalk Update – Marriott Faces GDPR Fines, TA505 Global Attacks, Zoom 0-Day, and New Magecart Activity
Kacey and Alex join Harrison to walk through this week’s threat intelligence stories. Alex walks us through the highlight story this ...
Too Much Information: The Sequel | New Research
There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.
A Practical Guide to Reducing Digital Risk
This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.
Marriott Faces GDPR Fines - A DPO and CISO Discussion
Harrison (@pseudohvr) is joined by Digital Shadows co-founder and Data Privacy Officer, James Chappell (@jimmychappell), as well as CISO Rick Holland (@rickhholland), to discuss the news this week...
Harnessing Exposed Data to Enhance Cyber Intelligence
We will walk you through each stage of this exploited data cycle to illustrate the economy of exposed credentials, and then present ways you can protect and mitigate the threats targeting your organiz
Managing Digital Risk: 4 Steps to Take
In this blog, we walk you through the emergence of digital risks and key steps you can take to help your organization to securely achieve the benefits of digital transformation.
Facebook’s Libra Cryptocurrency: Cybercriminals tipping the scales in their favor
Since Facebook’s announcement on June 18, there has been a gold rush, with people scrambling to register a myriad of domain permutations that infringe on the new trademarks. These have ranged from see
Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers
Whether it’s intellectual property, proprietary code, personal data, or financial information, the goal of information security is to protect those ...
Interview With Deputy CISO At Accenture, Jason Lewkowicz
Harrison interviews Deputy CISO at Accenture, Jason Lewkowicz, and CISO at Digital Shadows, Rick Holland. The group discusses the importance of working functionally as a security team, cyber...
The CyberWire Daily Podcast: Too Much Information: The Sequel
Tamika Smith speaks with Harrison Van Riper from Digital Shadows aboutour recent report, “Too Much Information: The Sequel,” outlining the increase in data exposure over the past year.
Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar
Most organizations have evolved to embrace the API economy and utilize multiple vendors and systems for the delivery of their products and services. Whenever you utilize a vendor, that requires data,
Managing Infosec Burnout: The Hidden Perpetrator
As we come to focus our efforts in combating Infosec burnout, we have got to ensure we are aiming in the right direction.
Leaky SMB File Shares – So Many Bytes!
Everyone loves a sequel. If you’re an avid Marvel fan, you’re probably sitting on the edge of your seat waiting ...
Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser
Phishing remains one of the most pervasive threats to enterprise, the simple but effective technique of tricking unassuming users into ...
Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study
Soi Dog, an animal charity, had been experiencing some issues around their digital security that was beginning to distract from their core operations and was concerning the management team.
Best Practices Protecting Your Brand Online - Webinar Recording
Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.
Detecting Spoof Domains - Domain Infringement | Case Study
See how one global retailer detected almost 2,000 domains impersonating their brand.
Digital Shadows Company Overview Video