Executive Guardian
Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
PassiveTotal strives to simplify threat infrastructure analysis, reduce analyst assessment time, and provide relevant information to assist in analysis, no matter how you access our data set. Brandon and I realize that a significant amount of our user base conducts threat infrastructure analysis using Patervas graph-based analysis tool, Maltego. Maltego assists analysts in visualizing threat infrastructure through link/node connections and allows for multiple data sources to be combined into a single interactive graph. This tool can be especially helpful when analyzing a complex infrastructure by visually aiding analysts in connecting disparate data sets.
With the above goals in mind, today we release a new set of transforms to go along with our new API via our partner, Malformity Labs. These transforms are available through the Paterva hub and should work on both community and enterprise versions of Maltego.
Within our updated transform set, users have the same data access as available in our API, but with some extra benefits, such as transforms to identify SSL certificates. These filters allow an analysts to target their transform query to avoid unnecessarily cluttering of their Maltego graph with data that is not relevant to their investigation.
Finally, weve now included the ability for analysts to push data back into PassiveTotal directly from their Maltego chart without opening a browser. Analysts can persist classifications and tag values on any domain or IP address simply by running the appropriate transform. Brandon and I consider the feedback loop to be one of the biggest values to PassiveTotal as it builds a repository of analysis that continues to show up alongside new research efforts.
RiskIQFollow
RiskIQ is the leader in attack surface management. We help organizations discover, understand, and mitigate exposures across all digital channels.
RiskIQ's #COVID19 Daily Update for 4/1: ➡️Pentagon to send 2,000 ventilators to #FEMA and the #HHS ➡️US intelligence: China has under-reported cases and fatalities ➡️Carnival Cruise Line will raise ~ $6 billion in debt & equity Read the full update here: https://bit.ly/2Uv3CMV
RiskIQ's #COVID19 Daily #Cybercrime Update for 3/31: ➡️RiskIQ observed a large Iranian #malware campaign impersonating official #WHO representative ➡️#WHOIS reliability issues fueling COVID-19 cybercrime ➡️Updated #spam stats Read the full update here: https://bit.ly/2QwfRHS
"As we’re now all isolating ourselves and homebound, it means online purchases will spike and makes it a prime time for criminals." - @ydklijnsma. Read more about the 20% spike in #Magecart due to #COVID19 in @WIRED https://bit.ly/2UVaC5E
RiskIQ's #COVID19 Daily Update for 3/30: ➡️The U.S. confirms cases jumped by 108,302 (+307%) ➡️FBI warns hospitals of supply-chain scams ➡️FDA issues emergency authorization for the use of hydroxychloroquine and chloroquine Read the full update here: https://bit.ly/2Uv3CMV
According to @campuscodi, @sniko_ was able to use @PassiveTotal to link nine malicious QR code generator sites that have stolen $46,000 to three web servers, which hosted 450+ other websites—all with "shady-looking domains." Read more in @ZDNet https://zd.net/2QRPjkq