Executive Guardian
Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
Hillary Clinton is in hot water for her decision to use a private email domain instead of her government-issued one when she was Secretary of State. In her defense, she claimed that since she owned the server and it wasn’t a Gmail or Hotmail account, she was acting responsibly.
As it turns out, there was likely a three-month period during which her private domain was unencrypted. In this time she also traveled to China, Israel, Japan, Korea and Turkey on official state business and was presumably communicating job-related information via email.
While she firmly believes that no breach occurred, the reality is neither she nor the State Department can confirm that. It is a fact that some of the countries she traveled to, like China, are actively engaged in cyber espionage against the U.S.
“In locations where the countries are known to operate and monitor network communications, like China and other countries, that certainly would be a real threat,” [Kevin] Bocek [VP of Security Strategy and Threat Intel at Venafi] said, mentioning that some parts of the world are “known to have active eavesdropping campaigns.”
Does this mean her emails were intercepted? There no evidence of that. However, this security oversight perfectly illustrates how an elected official can unwittingly compromise state security. It turns out Clinton isn’t the only VIP who uses private email addresses.
Tom Kellerman, Chief Cyber Security Officer for Trend Micro, is quoted in a Forbes article saying, “[M]ost wealthy Americans will use some kind of private cloud-based service to protect their anonymity and insulate themselves from the media.” The only problem: privacy seekers are “not insulating themselves from hackers.”
If the private email account of, for instance, the CEO of a major corporation fell into the hands of the wrong people, it could have devastating consequences. This type of email account could have login credentials, potentially enabling hackers to spoof the CEO’s email address and request wire transfers to hacker-owned bank accounts or extract other sensitive data.
Hillary Clinton’s actions help illuminate the magnitude of the challenges faced by CISOs. That being said, how much authority does the average CISO have to govern the Internet activities of board members or CEOs? Probably about as much as they have to govern the web and mobile development projects of sales and marketing.
Realistically, CISOs–particularly in enterprises that are new to security–will need to find technology that will help them gain visibility into shadowy areas where sensitive data exists or is being transmitted online.
They need a way to stay ahead of any sticky wickets such as rogue email domains or other digital assets. If they can stay on top of these potential points of vulnerability, they can stay ahead of internal and external security threats.
RiskIQFollow
RiskIQ is the leader in attack surface management. We help organizations discover, understand, and mitigate exposures across all digital channels.
RiskIQ's #COVID19 Daily Update for 4/1: ➡️Pentagon to send 2,000 ventilators to #FEMA and the #HHS ➡️US intelligence: China has under-reported cases and fatalities ➡️Carnival Cruise Line will raise ~ $6 billion in debt & equity Read the full update here: https://bit.ly/2Uv3CMV
RiskIQ's #COVID19 Daily #Cybercrime Update for 3/31: ➡️RiskIQ observed a large Iranian #malware campaign impersonating official #WHO representative ➡️#WHOIS reliability issues fueling COVID-19 cybercrime ➡️Updated #spam stats Read the full update here: https://bit.ly/2QwfRHS
"As we’re now all isolating ourselves and homebound, it means online purchases will spike and makes it a prime time for criminals." - @ydklijnsma. Read more about the 20% spike in #Magecart due to #COVID19 in @WIRED https://bit.ly/2UVaC5E
RiskIQ's #COVID19 Daily Update for 3/30: ➡️The U.S. confirms cases jumped by 108,302 (+307%) ➡️FBI warns hospitals of supply-chain scams ➡️FDA issues emergency authorization for the use of hydroxychloroquine and chloroquine Read the full update here: https://bit.ly/2Uv3CMV
According to @campuscodi, @sniko_ was able to use @PassiveTotal to link nine malicious QR code generator sites that have stolen $46,000 to three web servers, which hosted 450+ other websites—all with "shady-looking domains." Read more in @ZDNet https://zd.net/2QRPjkq