Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Rackspace Accelerates External Digital Threat Investigation with RiskIQ PassiveTotal
Download Case Study
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
The 2018 holiday shopping season was a boon for retailers, but cyber threat actors filled their pockets, too.
As businesses innovate by expanding their online presence and migrating to the cloud, their digital footprints grow tenfold. This footprint, a collection of far-flung, client-facing assets outside the firewall that hackers can and will discover as they research their next cyber threat campaigns, becomes part of their attack surface.
Assets outside the firewall were the inroad for some of the worst hacks of 2018, and businesses continued to see attackers target these attack surfaces during the 2018 holiday shopping season.
The flurry of shopping activity over the 2018 holiday shopping season saw retail sales in the U.S. from November first through Christmas Eve grow 5.1 percent to more than $850 billion, making it the best holiday shopping season in six years. But what did the cyber threat activity around this shopping frenzy look like?
To examine the cyber threat landscape over the 2018 holiday shopping season, RiskIQ conducted research using the RiskIQ Global Blacklist and mobile app database* looking for instances of malicious apps and URLs targeting 10 of the most trafficked brands on Black Friday. Following up our 2018 Black Friday Blacklist report which analyzed cyber threats targeting Black Friday and Cyber Monday in the weeks leading up to the events, this brief focuses on the period between Black Friday and New Year’s day.
The findings confirmed that cyber threat activity was consistent through the holiday shopping season, with cyber threat actors leveraging these ten mega-popular brands across both web and mobile.
Download the Snapshot for insights like these and much more
When organizations manage their entire attack surface, they understand what they look like from the outside-in, and can begin developing strategy that allows them to discover everything associated with their organization on the internet, both legitimate and malicious, and shrink its attack surface down to size.
Download the report here, and click here to find out how RiskIQ can help your organization manage its attack surface today.
Another Magecart group has started to compromise misconfigured S3 buckets! Please secure your buckets.
We detailed how to secure your S3 Buckets in our original reporting: https://t.co/QKrZqWV506
The Columbus, OH #ThreatHunting community is out in full force for today's workshop! Together, we're powering better investigations through data.
Some insights based on reporting by @RiskIQ: Beyond Wipro: Meet the ‘Gift Cardsharks’ Behind the Massive Campaign Targeting Victims with Commercially Available Tools https://t.co/6Vxsnygp1z via @ooda
For today's executives, protecting your organization means protecting yourself—and knowing that personal security sits at the confluence of the physical and digital worlds. https://t.co/HShORi3X6j #ExecutiveProtection #ExecutiveSecurity
Overlap in RiskIQ's unique data sets uncovered a massive threat campaign using popular marketing and analytics tools to target gift card retailers, distributors, and processors. Here's what you need to know https://t.co/GkHsPFwkkd #ThreatIntelligence