We recently worked with a bank that was in the process of moving their support channels to their website and social media. They turned to Digital Shadows to ensure their brand was not being misappropriated on social media, as they had received reports of fake support targeting customers on Twitter.
Online Brand Security
Cybercriminals impersonate your brand by registering spoof domains, social media accounts, and mobile appli...
Error - something went wrong!
Other content in this Stream
Online Brand Security
Cybercriminals impersonate your brand by registering spoof domains, social media accounts, and mobile applications. SearchLight enables you to detect Domain Impersonation, Malicious Mobile Apps...
A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure
Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.
Detecting Spoof Domains - Domain Infringement
See how one global retailer detected almost 2,000 domains impersonating their brand.
Fitbit and Digital Shadows: Protecting Brands from Digital Risks and the Dark Web
Watch this on demand webinar to learn how to identify and eliminate counterfeit digital sites, social media, and apps and how to identify and mitigate threats from the dark web.
Episode 59: Practitioner’s Guide to Email Spoofing
Senior security engineer, Simon Hall joins Rafael Amado to explain how IT teams and defenders can combat email spoofing, one of the most popular techniques used by phishers. Simon discusses why...
Weekly Intelligence Summary 14 Feb - 21 Feb 2019
Highlights from the week include: A new financially motivated threat actor advertised up to 841 million data records for sale on Dream Market; “APT-C-36” has targeted multiple Colombian sectors, inclu
A Practical Guide to Reducing Digital Risk
This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.
Security Practitioner’s Guide to Email Spoofing and Risk Reduction
In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we ...
Mobile Application Detected Impersonating Company Brand
Digital Shadows helped an IT manager of a retailer discover a mobile application impersonating their brand on a mobile app store.
Digital Risk: The C-Suite's Critical Missing Part of Overall Risk
In this report, you will learn the emergence of Digital Risk Protection, a framework for protecting against Digital Risks, questions the C-Suite should be asking.
Weekly Intelligence Summary: Ep 4
This week, Alex Guirakhoo and Jamie Collier join Harrison to discuss APT39, a new Iran-linked espionage group, as well as other highlights from this week involving updated information about...
FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar
Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr
Digital Risk Protection 2018 Forrester New Wave
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
Protecting Your Brand: Return on Investment
Last week I was joined by Brett Millar, Director of Global Brand Protection for Fitbit, for a webinar on “Protecting ...
Mitigating the Top 7 Dark Web Threats to Your Enterprise
The dark web continues to pose extremely dangerous threats as cyber criminals coordinate attacks and trade intelligence about your enterprise. Join us for us for an informative session on the 7 most p
Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It
We cover a range of the different techniques attackers of all persuasions (whether sophisticated nation state or low-level hacker) choose when performing their phishing campaigns.
Episode 54: Marriott Breach And 2019 Trends
Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott data breach, as well as a look forward to trends we might see in 2019. Specifically, we dig...
How to Leverage Threat Intelligence to Protect Against Digital Risks
Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab
Phishing Site Detected and Taken Down
An IT manager of a multinational financial services holding company involved in Investment Banking, Private Banking, and Asset Management discovered a phishing site impersonating their brand.
Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online