Digital Shadows helped the Security Manager of a healthcare provider discover an unsecured File Transfer Protocol (FTP) server that included a PDF file of a blueprint for the client's office space.
6 Considerations When Purchasing Threat Intelligence
When selecting the optimal CTI solution for your organization, buyers should use CARTER as a guide to asses...
Error - something went wrong!
Other content in this Stream
Third Party Risk
Learn how Digital Shadows monitors, manages, and remediates third party risks to your business.
How ADP Manages 3rd Party & Supply Chain Risk
Recorded webcast with Guest Speaker V.Jay LaRosa from ADP discussing best practices mitigating cyber risks from complex service delivery ecosystems.
Cybercriminals on the Outlook for Your Emails
In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.
Eliminating Third Party Cyber Risks from Healthcare Delivery
Hear from Associate Director Suzanne Schwartz from the Food and Drug Administration and Digital Shadows for an informative session on best practices for eliminating third party risks.
Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions
During this session you’ll learn from Dean Kinsman, Supervisory Special Agent with the FBI Cyber Division in Nashville and Rafael Amado of Digital Shadows on how to identify and prevent business email
Thedarkoverlord Out to KickAss and Cash Out Their Data
A user claiming to be the notorious darkoverlord extortionist threat actor has appeared on a dark web cybercriminal forum offering ...
Airline Boosts Cybersecurity Coverage to Protect Rewards Program Customers
With Digital Shadows SearchLight™, an airline discovered that a trove of frequent flyer accounts had been compromised and posted for sale online. Airline points can be sold on on criminal ...
ERP Applications Under Fire
The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what
Digital Risk Protection 2018 Forrester New Wave
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
Contractor Exposed Manufacturer's Sensitive Data
Digital Shadows helped a manufacturing firm discover that a third party contractor exposed sensitive Non Disclosure Agreements signed by its customers via NAS (network addressed storage).
Five Threats to Financial Services: Part Four, Payment Card Fraud
Payment card information is the lifeblood of the cybercriminal ecosystem. In previous blogs in this series, we’ve focused on how ...
The State of Cybercrime in the Post-AlphaBay and Hansa Age
Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.
Demystifying the Dark Web and Mitigating Risks
Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.
Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture
Digital risk protection consists of monitoring and remediating external risk exposure online. In this blog, I take a look at the current state of digital risk protection and where I see its future.
7 Ways the Digital Risk Revolution Changes Risk and Compliance
CTO and co-founder of Digital Shadows joins VP of Development at Lockpath for a webinar around how the digital risk revolution changes risk and compliance.
Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files
Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.
PoS System Infects Hotel Chain with Malware
Digital Shadows helped a global hospitality and hotel chain discover that it's Point of Sale devices had been breached.
Episode 26: Mythbusting Vulnerabilities and Exploits
Simon Hall and Richard Gold join Rafael Amado to discuss misconceptions around vulnerabilities and exploits, other techniques for gaining code execution, and how organizations can prioritize the...
Leveraging the 2018 Verizon Data Breach Investigations Report
Today, the 11th edition of the Verizon Data Breach Investigations Report (DBIR) has been released. This year’s report includes 53,308 ...
Digital Shadows finds 1.5 billion business and consumer files exposed online