Retail

Retail and e-commerce organizations have a wealth of sensitive data and deep supply chains that can expose your business, customers, and brand to a wide variety of digital risks.

  • Top Cyber Threats to the Retail Sector

    Top Cyber Threats to the Retail Sector

    Given the frequent number of transactions, retail companies are frequently the target of financially-motivated threat actors seeking to compromise payment card details.

    Read Report
  • Digital Shadows Helps Large Retailer Navigate Extortion Attempt

    Digital Shadows Helps Large Retailer Navigate Extortion Attempt

    Digital Shadows client received an email from a known attack group demanding a large sum of money to prevent a denial-of-service attack on their website.

    Read Report
  • Digital Risk Protection 2018 Forrester New Wave

    Digital Risk Protection 2018 Forrester New Wave

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Digital Risk Management for Retail

    Learn More
  • Cybercriminals on the Outlook for Your Emails

    Cybercriminals on the Outlook for Your Emails

    In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.

    Read Report
  • Episode 47: Ransomware Surges in October, Cathay Pacific Breach, and Triton Attributed

    Episode 47: Ransomware Surges in October, Cathay Pacific Breach, and Triton Attributed

    Harrison Van Riper and Rafael Amado join Michael Marriott to discuss the latest stories from the week. This week’s podcast has a strong Guy Richie flavor, with a focus on lock, stock and ru...

    Read Post
  • Read Full Report
  • Ecommerce Retailer Uncovers Coupon Fraud Scheme

    Ecommerce Retailer Uncovers Coupon Fraud Scheme

    Digital Shadows helped an IT manager of an ecommerce retailer discover a Twitter account advertising 75% off coupons for their website.

    Read Report
  • ×

    Join 150k subscribers and get the latest news & threat intel in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • The Dark Web: Marketers’ Trick or Threat Intelligence Treat?

    The Dark Web: Marketers’ Trick or Threat Intelligence Treat?

    While the dark web is overhyped, it’s not all a load of hocus pocus. Nevertheless, you shouldn’t be waiting until data is offered for sale on the dark web – there’s plenty you can be doing to prev...

    Read Post
  • How ADP Manages 3rd Party & Supply Chain Risk57:25

    How ADP Manages 3rd Party & Supply Chain Risk

    Recorded webcast with Guest Speaker V.Jay LaRosa from ADP discussing best practices mitigating cyber risks from complex service delivery ecosystems.

    Watch Video
  • Fitbit and Digital Shadows: Protecting Brands from Digital Risks and the Dark Web48:01

    Fitbit and Digital Shadows: Protecting Brands from Digital Risks and the Dark Web

    Watch this on demand webinar to learn how to identify and eliminate counterfeit digital sites, social media, and apps and how to identify and mitigate threats from the dark web.

    Watch Video
  • Demystifying the Dark Web and Mitigating Risks1:03:52

    Demystifying the Dark Web and Mitigating Risks

    Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.

    Watch Video
  • Cyber Security Awareness Month: Week 3 – It’s Everyone’s Job to Ensure Online Safety at Work

    Cyber Security Awareness Month: Week 3 – It’s Everyone’s Job to Ensure Online Safety at Work

    This week, National Cyber Security Awareness Month (NCSAM) focuses on accountability and responsibility within the information security space: “It’s Everyone’s ...

    Read Post
  • ×

    Request a
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • Mobile Application Detected Impersonating Company Brand

    Mobile Application Detected Impersonating Company Brand

    Digital Shadows helped an IT manager of a retailer discover a mobile application impersonating their brand on a mobile app store.

    Read Report
  • Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.

    Read Report
  • Business Email Compromise: When You Don’t Need to Phish

    Business Email Compromise: When You Don’t Need to Phish

    According to the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) have caused $12 billion in losses since ...

    Read Post
  • 7 Ways the Digital Risk Revolution Changes Risk and Compliance53:06

    7 Ways the Digital Risk Revolution Changes Risk and Compliance

    CTO and co-founder of Digital Shadows joins VP of Development at Lockpath for a webinar around how the digital risk revolution changes risk and compliance.

    Watch Video
  • Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions49:02

    Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions

    During this session you’ll learn from Dean Kinsman, Supervisory Special Agent with the FBI Cyber Division in Nashville and Rafael Amado of Digital Shadows on how to identify and prevent business email

    Watch Video
  • Inside Online Carding Courses Designed for Cybercriminals

    Inside Online Carding Courses Designed for Cybercriminals

    Digital Shadows lifts the lid on sophisticated Russian language e-learning credit card fraud courses.

    Read Report
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age

    The State of Cybercrime in the Post-AlphaBay and Hansa Age

    Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.

    Read Report
  • Cyber Security Awareness Month: Week 1 – Credential Hygiene

    Cyber Security Awareness Month: Week 1 – Credential Hygiene

    It’s the opening week of the annual National Cyber Security Awareness Month (U.S.) and Cyber Security Month (Europe). While good ...

    Read Post
  • Digital Shadows Shadow Search™ Demo2:10

    Digital Shadows Shadow Search™ Demo

    Shadow Search provides fast access to raw & curated intelligence that frees up time for other security responsibilities. Request a demo: https://info.digitalshadows.com/shadow-search-demo.html Resour

    Watch Video
  • loading
    Loading More...