Brand Security

Show
Enabling Soi Dog’s Digital Transformation: A Case Study
May 8, 2019

At the beginning of this year I was introduced to Spencer Hardy, the IT manager for an animal charity called …

read more

Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers

July 2, 2019

Whether it’s intellectual property, proprietary code, personal data, or financial information, the goal of information security is to protect those …

read more

Facebook’s Libra Cryptocurrency: Cybercriminals tipping the scales in their favor

June 27, 2019

The announcements of Facebook’s new cryptocurrency “Libra” and its associated digital wallet “Calibra” have conjured up discussion, debate, criticism, and …

read more

Managing Digital Risk: 4 Steps to Take

June 18, 2019

Organizations are finding it increasingly difficult to know where their data is stored and shared in today’s technology-forward, connected world. …

read more

Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser

May 21, 2019

Phishing remains one of the most pervasive threats to enterprise, the simple but effective technique of tricking unassuming users into …

read more

Cyber Talent Gap: How to Do More With Less

May 14, 2019

The challenge facing us today is twofold: not only is the digital footprint of the organizations we want to protect …

read more

Easing into the extortion game

April 3, 2019

One of the main ideas which flowed through Photon’s most recent research report, A Tale of Epic Extortions, was that cyber …

read more

Dark Web Typosquatting: Scammers v. Tor

March 21, 2019

Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can …

read more

How to Secure Your Online Brand

March 20, 2019

What is online brand security? As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand …

read more

Extortion Exposed: Sextortion, thedarkoverlord, and SamSam

February 21, 2019

In our most recent research, A Tale of Epic Extortions, the Digital Shadows Photon Research Team approached the topic of …

read more

Introducing Our Practical Guide to Reducing Digital Risk

February 12, 2019

Download a copy of A Practical Guide to Reducing Digital Risk   Digital Footprints and Digital Shadows Back when Al …

read more

Security Practitioner’s Guide to Email Spoofing and Risk Reduction

January 24, 2019

In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we …

read more

Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

December 12, 2018

Overall, the infosec community has done a relatively good job in securing systems. While a measure of restrained back-patting is …

read more

Phishing Site Impersonates Financial Services Institution

October 10, 2018

If the infamous bank robber, Willie Sutton, were alive today and honed his cyber skills, he might turn his attention …

read more

Business Email Compromise: When You Don’t Need to Phish

October 4, 2018

According to the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) have caused $12 billion in losses since …

read more

Cyber Security Awareness Month: Week 1 – Credential Hygiene

October 3, 2018

It’s the opening week of the annual National Cyber Security Awareness Month (U.S.) and Cyber Security Month (Europe). While good …

read more