Whitepapers & Reports

Check out our research reports around important digital risks to your organization.

  • Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.

    Read Report
  • ×

    Subscribe to get the latest news and threat intelligence in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Cryptocurrency - The New Gold Rush for Cybercriminals

    Cryptocurrency - The New Gold Rush for Cybercriminals

    Cybercriminals have developed several schemes to defraud those looking to profit from the growth in cryptocurrencies.

    Read Report
  • 8 Key Recommendations for GDPR Readiness

    8 Key Recommendations for GDPR Readiness

    8 Key Recommendations for GDPR Readiness from James Chappell, CTO and Co-Founder, Digital Shadows.

    Read Report
  • The Path to GDPR Compliance

    The Path to GDPR Compliance

    Are you ready? In May 2018, the European Union's new General Data Protection Regulation comes into force. Learn how to become compliant before then.

    Read Report
  • The Business of Disinformation: A Taxonomy

    The Business of Disinformation: A Taxonomy

    The availability of tools found by Digital Shadows research team means that barriers to entry are lower than ever.

    Read Report
  • Advice from the Board: All Companies Should Require Digital Risk Management to Mitigate Corporate Risk

    Advice from the Board: All Companies Should Require Digital Risk Management to Mitigate Corporate Risk

    Rob Theis of World Innovation Lab dives into why companies must take digital risk seriously.

    Read Report
  • Lessons Learned from Equifax Breach

    Lessons Learned from Equifax Breach

    What can be done to prevent, detect, and mitigate damage to your business and brand as a result of a data breach.

    Read Report
  • Inside Online Carding Courses Designed for Cybercriminals

    Inside Online Carding Courses Designed for Cybercriminals

    Digital Shadows lifts the lid on sophisticated Russian language e-learning credit card fraud courses.

    Read Report
  • Learn More About Digital Shadows SearchLight™

    Learn More
  • Account Takeover: Protect Your Customer and Employee Accounts

    Account Takeover: Protect Your Customer and Employee Accounts

    Cybercriminals are increasingly turning to credential stuffing tools to automate attempts at account takeover, making these leaked credentials very useful for them.

    Read Report
  • ×

    Register to Watch Demo Video

    First Name
    Last Name
    Phone Number
    Job Title
    Company
    Country
    State
    Thank you!
    Error - something went wrong!
  • Why Marketing Leaders Must Take Action To Manage Digital Risk and Protect Their Brand

    Why Marketing Leaders Must Take Action To Manage Digital Risk and Protect Their Brand

    Chief Marketing Officer, Daniel Lowden, discusses why marketing leaders must take action to manage digital risks and protect their brand.

    Read Report
  • ESG: The Pressing Need for Digital Risk Management

    ESG: The Pressing Need for Digital Risk Management

    CISOs and risk officers must adopt a thorough digital risk management strategy that includes monitoring, filtering, prioritizing, and responding to threats across the public Internet and dark web.

    Read Report
  • OReilly - Patrolling the Dark Net

    OReilly - Patrolling the Dark Net

    This report explores both the benign and malevolent activities of the dark net, and the dark web.

    Read Report
  • Cybercrime and the Holiday Season

    Cybercrime and the Holiday Season

    Learn about cybercrime this holiday season.

    Read Report
  • Industries Most Likely to be Targeted by Credential Stuffing Attempts

    Industries Most Likely to be Targeted by Credential Stuffing Attempts

    Discover which industries are most likely to be targeted by cybercriminals with credential stuffing attempts.

    Read Report
  • loading
    Loading More...