Brand Security

Show
Enabling Soi Dog’s Digital Transformation: A Case Study
May 8, 2019

At the beginning of this year I was introduced to Spencer Hardy, the IT manager for an animal charity called …

read more

Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers

July 2, 2019

Whether it’s intellectual property, proprietary code, personal data, or financial information, the goal of information security is to protect those …

read more

Facebook’s Libra Cryptocurrency: Cybercriminals tipping the scales in their favor

June 27, 2019

The announcements of Facebook’s new cryptocurrency “Libra” and its associated digital wallet “Calibra” have conjured up discussion, debate, criticism, and …

read more

Managing Digital Risk: 4 Steps to Take

June 18, 2019

Organizations are finding it increasingly difficult to know where their data is stored and shared in today’s technology-forward, connected world. …

read more

Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser

May 21, 2019

Phishing remains one of the most pervasive threats to enterprise, the simple but effective technique of tricking unassuming users into …

read more

Cyber Talent Gap: How to Do More With Less

May 14, 2019

The challenge facing us today is twofold: not only is the digital footprint of the organizations we want to protect …

read more

Easing into the extortion game

April 3, 2019

One of the main ideas which flowed through Photon’s most recent research report, A Tale of Epic Extortions, was that cyber …

read more

Dark Web Typosquatting: Scammers v. Tor

March 21, 2019

Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can …

read more

How to Secure Your Online Brand

March 20, 2019

What is online brand security? As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand …

read more

Extortion Exposed: Sextortion, thedarkoverlord, and SamSam

February 21, 2019

In our most recent research, A Tale of Epic Extortions, the Digital Shadows Photon Research Team approached the topic of …

read more

Introducing Our Practical Guide to Reducing Digital Risk

February 12, 2019

Download a copy of A Practical Guide to Reducing Digital Risk   Digital Footprints and Digital Shadows Back when Al …

read more

Security Practitioner’s Guide to Email Spoofing and Risk Reduction

January 24, 2019

In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we …

read more

Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

December 12, 2018

Overall, the infosec community has done a relatively good job in securing systems. While a measure of restrained back-patting is …

read more

Phishing Site Impersonates Financial Services Institution

October 10, 2018

If the infamous bank robber, Willie Sutton, were alive today and honed his cyber skills, he might turn his attention …

read more

Business Email Compromise: When You Don’t Need to Phish

October 4, 2018

According to the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) have caused $12 billion in losses since …

read more

Cyber Security Awareness Month: Week 1 – Credential Hygiene

October 3, 2018

It’s the opening week of the annual National Cyber Security Awareness Month (U.S.) and Cyber Security Month (Europe). While good …

read more

Sextortion – When Persistent Phishing Pays Off

September 6, 2018

You may have heard of a recent surge in sextortion-based phishing campaigns. These campaigns seek to extort victims by threatening …

read more

Five Threats to Financial Services: Phishing Campaigns

August 8, 2018

In our last blog, we highlighted how banking trojans are a threat to banking customers and small businesses, normally delivered …

read more

It’s Accrual World: Tax Return Fraud in 2018

March 7, 2018

With just over a month until Tax Deadline Day, individuals are scrambling to get their tax returns submitted. This is …

read more

Phishing for Gold: Threats to the 2018 Winter Games

February 6, 2018

Digital Shadows has been monitoring major sporting events since 2014, beginning with the Winter Olympics in Sochi, Russia, and then …

read more

Authentication Nation: 5 Ways NIST is Changing How We Think About Passwords

May 9, 2017

Passwords have taken a beating over the past several years, and there seems to be little question among leading practitioners …

read more

Monitoring the Mobile Threat Landscape

April 4, 2017

The UK’s National Cyber Security Centre (NCSC) and the National Crime Agency (NCA) released a joint paper on the cyber …

read more

Overexposed and Under-Prepared; The Risks of Oversharing Online

November 8, 2016

I have a confession to make. I know where you live. I also know who you’re married to and the …

read more

Five Tips For Better Email Security

November 8, 2016

While security is everyone’s responsibility, it’s not always easy to get right. Our “Security Best Practices” blog series will provide …

read more

Five Tips To Make Your Passwords Better

September 26, 2016

While security is everyone’s responsibility, it’s not always easy to get right. Our “Security Best Practices” blog series will provide …

read more