With over 1,442 cryptocurrencies in circulation, and new alternative coins – “altcoins” – emerging every week, cybercriminals have developed several schemes to defraud those looking to profit from the growth in cryptocurrencies.
Digital risk protection consists of monitoring and remediating external risk exposure online. In this blog,...
Other content in this Stream
Given the frequent number of transactions, retail companies are frequently the target of financially-motivated threat actors seeking to compromise payment card details.
This year, we will discuss the most common alerts we have sent to our retail clients, how these digital risks affect consumers as the holiday season approaches, and peek into the cybercriminal...
Fans of The Sopranos or Goodfellas are well-versed in the world of extortion. Whether it is paying off Tony Soprano ...
Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.
Coming to you from Dallas this week - we have Kacey, Harrison, Alex, and Charles. This week the team talks through third party app risks as they relate to COVID-19, as well as touch on security...
Digital Shadows client received an email from a known attack group demanding a large sum of money to prevent a denial-of-service attack on their website.
Watch this on demand webinar to learn how to identify and eliminate counterfeit digital sites, social media, and apps and how to identify and mitigate threats from the dark web.
Kacey, Charles, Alex, and Harrison host this week’s threat intelligence update from Dallas. We kick off with vulnerabilities from the week. This includes both the NSA CVE and Citrix CVE. The team...
Don’t assume your data is safe because you’ve completed a vendor risk questionnaire, or the third-party has a promising risk score. Data finds a way online. Find a way to detect it when it does.
Our team of researchers recently dug into the different popular dark web marketplaces to understand which marketplaces are gaining the most traction and what is being sold on these cybercriminal platf
See how a bank removed a spoof social media profiles targeting customers.
In this blog, we discuss several significant trends and events that have helped shape the cyber threat landscape, all of which will almost certainly continue through 2020.
Viktoria hosts this week and introduces the episode bringing Sammy on to provide some regional insight and context around the Iranian cyber threat and discusses whether a cyber response is likely.
Criminals are conducting Black Friday sales amongst themselves, many of which are on the dark web.
While it may be challenging to assess what went wrong for market[.]ms conclusively, this blog examines some potential reasons behind its demise, as well as looking at the extraordinary professionalism
We took a deep-dive into the cybercriminal underground to investigate the persistence of forums, uncovering several reasons they remain attractive amid appealing alternatives.
Part 2 looks at cybercriminal forum users’ resistance to moving away from the forum model.
The survival of the cybercriminal forum in the face of new, more secure technologies and constant pressure from law enforcement does not come as a surprise to researchers at Digital Shadows.
Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a ...
In this blog, we determine whether this targeted attack on BriansClub will impact the wider cybercriminal credit carding landscape, and speculate whether it could galvanize the community to push anoth