Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar

July 17, 2019

Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circulate and recirculate on the dark web for years, and be packaged and repackaged for crime, cyber espionage and fraud. Understanding how breached data is used, whether it be to create synthetic identities, take over bank accounts or perpetrate credit card fraud, to name a few, can play a big role in threat-intelligence, too. 

To learn more, check out our team's blog on the topic:

Harnessing Exposed Data to Enhance Cyber Intelligence

 

Previous Video
Photon Demonstration of Muraena
Photon Demonstration of Muraena

Digital Shadows' Photon Team configured Muraena to phish credentials from a test Google account, and used t...

Next Video
Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar
Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar

Learn how complex enterprises rely on third party systems, networks and service providers and the associate...