Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
While business is accelerating digital transformation and building out their online presence, cyber adversaries are going digital—big time, taking advantage of the online ecosystem and trusted brands. With phishing, malware, domain and brand abuse, ransomware, malicious mobile apps, and fake social posts getting worse – how prepared is your organization to mitigate external digital threats?
To find out, check out the 2017 State of Enterprise Digital Defense Report, available for download at https://www.riskiq.com/white-paper/state-of-digital-defense-2017/.
Independent research by IDG Connect quantifies the growing security management gap and business impact of external web, social, and mobile threats. Survey respondents included 465 IT information security decision makers in organizations with more than 1,000 employees in the U.S. and U.K.
Organizations must still account for investments in layered defenses to protect users, systems, and data behind their perimeter. But, external threat vectors are growing, and cyber adversaries are organized. When it comes to digital threats outside the firewall, digital exploits and exposures are harder to discover, validate, assess, and remediate. Incidents are often related to assets, from vulnerable web components and apps, rogue mobile apps and social profiles, to domain abuse, affiliate sites and malvertising, that are not easily visible, known, or under control of IT—if even owned by the company. More so, new and evolving privacy governance rules such as GDPR, require added digital due diligence.
The 16-page report shares findings and insights that should empower IT leadership and security professionals to re-examine how their organizations are equipped to manage digital transformation risks to protect their businesses, customers, and brands,
n=456 information security decision makers and practitioners in U.S. & U.K organizations with over 1,000 employees
We are pleased to sponsor this timely industry report, which covers the digital threat defense landscape, impact, controls, tools, and investments. Download the report here, and for a quick glance, get the infographic here. While visiting, be sure to see how our RiskIQ solutions can help your organization address the specter and spectrum of digital threats.
Get your #RSAC 2020 party started by joining RiskIQ at IGNITE, hosted by @FlashpointIntel! Register now: https://t.co/XhmW7kUCY8
Now you can see why we named it Magecart 🙃 it’s where it started in 2014. A group normally skimming data through Mage.php when a cart checkout is done, started pioneering a client-side JS skimmer.
The rest of the story can be read in our 2018 report: https://t.co/aGlU984pTU https://t.co/AwDlwdb36p
Based on data from @riskiq it appears this campaign by the Russian GRU to hack and breach Burisma in Ukraine started around 11-11-2019 (and possibly earlier) with the registration of the domain kub-gas[.]com cc @Ushadrons @file411 @IdeaGov #infosec #phishing #malware #disinfo
RiskIQ is excited to announce that growth expert Christophe Culine has joined our team as Chief Revenue Officer, leading our sales organization to great things in 2020 and beyond https://t.co/DYCAOfYeIa
RiskIQ's @ydklijnsma was on @DarknetDiaries to talk about the global phenomenon of #Magecart. Listen in on how credit card skimming on online purchases is happening—and happening often.