Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
While business is accelerating digital transformation and building out their online presence, cyber adversaries are going digital—big time, taking advantage of the online ecosystem and trusted brands. With phishing, malware, domain and brand abuse, ransomware, malicious mobile apps, and fake social posts getting worse – how prepared is your organization to mitigate external digital threats?
To find out, check out the 2017 State of Enterprise Digital Defense Report, available for download at https://www.riskiq.com/white-paper/state-of-digital-defense-2017/.
Independent research by IDG Connect quantifies the growing security management gap and business impact of external web, social, and mobile threats. Survey respondents included 465 IT information security decision makers in organizations with more than 1,000 employees in the U.S. and U.K.
Organizations must still account for investments in layered defenses to protect users, systems, and data behind their perimeter. But, external threat vectors are growing, and cyber adversaries are organized. When it comes to digital threats outside the firewall, digital exploits and exposures are harder to discover, validate, assess, and remediate. Incidents are often related to assets, from vulnerable web components and apps, rogue mobile apps and social profiles, to domain abuse, affiliate sites and malvertising, that are not easily visible, known, or under control of IT—if even owned by the company. More so, new and evolving privacy governance rules such as GDPR, require added digital due diligence.
The 16-page report shares findings and insights that should empower IT leadership and security professionals to re-examine how their organizations are equipped to manage digital transformation risks to protect their businesses, customers, and brands,
n=456 information security decision makers and practitioners in U.S. & U.K organizations with over 1,000 employees
We are pleased to sponsor this timely industry report, which covers the digital threat defense landscape, impact, controls, tools, and investments. Download the report here, and for a quick glance, get the infographic here. While visiting, be sure to see how our RiskIQ solutions can help your organization address the specter and spectrum of digital threats.
RiskIQ is the leader in attack surface management. We help organizations discover, understand, and mitigate exposures across all digital channels.
“(...) RiskIQ has been able to track much more of the bad guy’s infrastructure used in their scam operations. We’ve identified around 400 domains so far that are all tied to these scams.” - @ydklijnsma
WHAT JUST HAPPENED? Security pros offered a range of opinions about the breach. All agreed the fault did not lie with each hacked account's owner. Some say it may have come from inside @Twitter.
@BradyDale and @benjaminopowers report
Targeted #cyberthreats are spiking during #COVID19. We provide one source for information to simplify and accelerate your investigation process #ThreatHunting https://bit.ly/3c9xKoq
RiskIQ researchers just doubled the number of IoCs in the Pastebin. Please continue to monitor it for updates as this situation evolves https://pastebin.com/h64CK3CG #twitterhack #twitterhacks #ThreatIntel #IOCs
Just in case my last tweet got lost in the thread storm, @RiskIQ's list of domains apparently tied to this scam gives us a pretty good idea of who was targeted here. https://pastebin.com/h64CK3CG
This is developing very quickly, but seems to have been staged well in advance. Take a look at some these domains set up to support this scam. H/T @RiskIQ https://twitter.com/ydklijnsma/status/1283508384335925248
Leveraging @RiskIQ's datasets we have identified more infrastructure tied to the current cryptocurrency scammers impacting @elonmusk , @billgates, etc. This is research data, validate before taking action, it might identify new targets also.
At this point we can just assume the entire platform compromised. https://twitter.com/ydklijnsma/status/1283503695796162560
And they've just crossed the cryptocurrency boundary https://twitter.com/ydklijnsma/status/1283501318917611521