Executive Guardian
Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
Projects within RiskIQ PassiveTotal make it easy for analysts to gather and share information about current and ongoing digital threat investigations and known threat infrastructure. PassiveTotal Projects help you organize related threat infrastructure elements such as:
Once organized, you can easily hand off investigations to other analysts or maintain an ongoing workspace for future research. These Projects can be shared publicly with the security community or kept private among the other analysts within your organization.
As of June 2019, there are more than 1,600 public projects from 616 different contributors. Each of these is free to use by the entire security community. RiskIQ’s research team works closely with the analyst community and has published 41 curated public projects as starting points for new investigations. These Projects include recent threats, many of which appear in the news, giving you a head start in your research.
Magecart: https://community.riskiq.com/projects/29b34d00-0e49-ad5f-4886-8cd89deb9692
Wannacry: https://community.riskiq.com/projects/cc66064c-f94d-4b84-6bcc-4ff3cf51afa9
Fancy Bear: https://community.riskiq.com/projects/595028e7-753c-d437-444b-85689817dd8b
Learn more about Projects at https://help.passivetotal.org/ or create a project now.
Keeping track of activity on known malicious infrastructure can provide security operations groups with the needed insight to actively defend their networks. PassiveTotal allows you to view artifacts of interest for changes across data sets, making it easy for you to keep tabs on bad actors proactively.
Leveraging the datasets from RiskIQ, our monitoring framework will inspect for differences in resolutions, WHOIS records, data records, and associations. With the latest release of our monitoring framework, we have added support for the following datasets:
By utilizing Monitors, you can automate a critical portion of your workflow. Instead of constantly checking for changes in infrastructure, or worse, missing them altogether, you’ll now be notified both in email and the PassiveTotal platform. These alerts are also available through our API, allowing you to automate the responses.
PassiveTotal monitors provide you with real-time, in-platform, notifications of alerting entities. Additionally, you can also receive an email digest outlining the specific changes that occur for each artifact you’re monitoring. The digest includes a summary in the email and CSV attachments for each data set with crucial information about what changed.
Learn more about Monitors at https://help.passivetotal.org/infrastructure_monitoring.html OR Add to A Project Now
Have Questions? Open a chat in PassiveTotal!
RiskIQFollow
Apple disputes Google's accuracy on recent iOS hacks, and they may be right -agree with Apple on this one -also think Apple was wrong for not notifying users back when it learned of the attacks -features some insight from @ydklijnsma https://t.co/N3DISYqEdT
RiskIQ's @flibeau comments on how a ‘one for all’ #cybersecurity approach is needed to prevent the spread of #malvertising via @SCmagazineUK, in light of the observation of a series of attacks on WordPress sites using rogue admin accounts https://t.co/qp7aYweZC1
We are delighted to be named a finalist in the Computing Security Awards ‘Enterprise Security Solution of the Year’ category. Show your support by voting for us here @CSMagAndAwards https://t.co/rUETN4xPcA
Pumped to be presenting at #VB2019! I'll be: - Giving an update on the previously disclosed groups - Updates on TTP since the early report - New developments in skimmer "technology" - Interesting new players who joined the game - Undisclosed supply-chain attacks we observed https://t.co/MVkxZlnBUe
@cyberdefensemag Publisher @miliefsky Sharing an important story about Trump’s Cyber security Executive Order #cybersecurity #CYBER #SECURITY in this #CDM #EXCLUSIVE https://t.co/ztcs593TuM by Lou Manousos @RiskIQ who we hope to see @IPEXPO #CDM