Retail

Retail and e-commerce organizations have a wealth of sensitive data and deep supply chains that can expose your business, customers, and brand to a wide variety of digital risks.

  • Top Cyber Threats to the Retail Sector

    Top Cyber Threats to the Retail Sector

    Given the frequent number of transactions, retail companies are frequently the target of financially-motivated threat actors seeking to compromise payment card details.

    Read Report
  • Cybercriminal credit card stores: Is Brian out of the club?

    Cybercriminal credit card stores: Is Brian out of the club?

    In this blog, we determine whether this targeted attack on BriansClub will impact the wider cybercriminal credit carding landscape, and speculate whether it could galvanize the community to push anoth

    Read Post
  • To Pay or Not to Pay: A Large Retailer Responds to DDoS Extortion

    To Pay or Not to Pay: A Large Retailer Responds to DDoS Extortion

    Fans of The Sopranos or Goodfellas are well-versed in the world of extortion. Whether it is paying off Tony Soprano ...

    Read Post
  • Detecting Spoof Domains - Domain Infringement | Case Study

    Detecting Spoof Domains - Domain Infringement | Case Study

    See how one global retailer detected almost 2,000 domains impersonating their brand.

    Read Report
  • Weekly Intelligence Summary 24 Oct - 31 Oct 2019

    Weekly Intelligence Summary 24 Oct - 31 Oct 2019

    In the spotlight this week: A card skimming operation targeted the online retailer First Aid Beauty and evaded notice for months.

    Read Report
  • Discover why we’re named a "Leader" in Digital Risk Protection

    Forrester Report
  • Best Practices Protecting Your Brand Online - Webinar Recording59:41

    Best Practices Protecting Your Brand Online - Webinar Recording

    Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.

    Watch Video
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Digital Shadows Helps Large Retailer Navigate Extortion Attempt

    Digital Shadows Helps Large Retailer Navigate Extortion Attempt

    Digital Shadows client received an email from a known attack group demanding a large sum of money to prevent a denial-of-service attack on their website.

    Read Report
  • Understanding the Different Cybercriminal Platforms: AVCs, Marketplaces, and Forums

    Understanding the Different Cybercriminal Platforms: AVCs, Marketplaces, and Forums

    We’re all familiar with forums and marketplaces (we use them in our daily lives – think Reddit, eBay, or Amazon, for example), but what exactly is an AVC? What do they look like?

    Read Post
  • 7.5M Adobe Creative Cloud User Records Exposed, City Of Joburg Ransomware Attack, and APT28 Updates

    7.5M Adobe Creative Cloud User Records Exposed, City Of Joburg Ransomware Attack, and APT28 Updates

    Adam Cook, Philip Doherty, and Viktoria Austin host this week’s ShadowTalk update around an unsecured Elasticsearch database exposing account information of aboutt 7.5 million Adobe Creative Cloud...

    Read Post
  • Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat

    Read Post
  • Dark Web Monitoring: The Good, The Bad, and The Ugly

    Dark Web Monitoring: The Good, The Bad, and The Ugly

    Gaining access to dark web and deep web sources can be extremely powerful – if you focus on relevant use cases. The most successful strategies we observe have clear requirements, such as fraud detecti

    Read Post
  • ×

    Request a
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • Typosquatting and the 2020 U.S. Election, Honeypots, And Sudo Vulnerability

    Typosquatting and the 2020 U.S. Election, Honeypots, And Sudo Vulnerability

    Kacey, Charles, Harrison, and Alex kick off this week’s episode talking about our Fall Dallas team event (an amateur version of Chopped). Then we dig into the hot topics of the week.

    Read Post
  • Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

    Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

    How can the modern network of .onion marketplaces be understood through novels about a cyberpunk dystopia? The answer is in how dark web marketplaces grow and die.

    Read Post
  • Domain Squatting: The Phisher-man’s Friend

    Domain Squatting: The Phisher-man’s Friend

    Simon talks about how easy it is to conduct domain squatting and typosquatting, and how little monitoring still goes on around them in the industry.

    Read Post
  • SecDevOps: Continued Database Exposures Point to Growing Challenges

    SecDevOps: Continued Database Exposures Point to Growing Challenges

    Last week, we learned that millions of Ecuadorian’s personal details had been exposed by a misconfigured ElasticSearch database. This is ...

    Read Post
  • Threat Intelligence Time Management and Prioritization: An Interview with Xena Olsen

    Threat Intelligence Time Management and Prioritization: An Interview with Xena Olsen

    Rick Holland and Harrison Van Riper interview Xena Olsen in this episode of ShadowTalk. The team focus their discussion on how to get timely, but effective intelligence out the door.

    Read Post
  • Detecting Fake Social Media Profiles | Case Study

    Detecting Fake Social Media Profiles | Case Study

    See how a bank removed a spoof social media profiles targeting customers.

    Read Report
  • Digital Risk Protection: Forrester New Wave Report

    Digital Risk Protection: Forrester New Wave Report

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • More Sodinokibi Activity, Imperva Breach, And Weirdest Food At The Texas State Fair

    More Sodinokibi Activity, Imperva Breach, And Weirdest Food At The Texas State Fair

    Rick Holland and Alex Guirakhoo join Harrison Van Riper this week to talk through more Sodinokibi activity. Just yesterday, a cloud hosting provider for Digital Dental Records was hit with...

    Read Post
  • Detecting Exposed Credentials | Case Study

    Detecting Exposed Credentials | Case Study

    See how one large bank detected more than 50,000 exposed credentials in 1 year.

    Read Report
  • loading
    Loading More...