Executive Guardian
Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
These days, mobile security is top of mind for consumers and businesses alike, and for good reason—the mobile channel is ubiquitous and provides cyber threat actors a vast attack surface to target.
At home, 82 percent of online users in the United States used a mobile device for online shopping, with 35 percent being mobile-only online shoppers. In 2020, U.S. mobile retail revenues are expected to amount to 339.03 billion U.S. dollars, up from 207.15 billion U.S. dollars in 2018.
At work, employees use their phones on the company network and access sensitive corporate data every day. Even the way users interact with mobile devices is risky, as the smaller screens and simpler UIs make it easier for users to make more impulsive, uninformed decisions which increase their susceptibility to social engineering and fraud.
To highlight the mobile cyber threat landscape in the first quarter of 2019, RiskIQ published our Mobile Threat Landscape Q1 2019 report, which highlights our coverage of over 120 mobile app stores around the world, and our scans of nearly two billion resources looking for mobile apps in the wild. For the second-straight quarter, RiskIQ added over two million new apps to our database, partially due to RiskIQ’s ever-expanding list of monitored mobile app stores, but also because of the continued explosive growth of the mobile app market.
Additionally, Q1’s report includes a review of 2018’s mobile landscape, which demonstrates that the past 18 months have proven that even the savviest of users must be discerning and skeptical when downloading anything. Findings highlight ways in which Magecart, the infamous syndicate of credit-card skimming groups, assaulted retailers via mobile, including British Airways, which involved the compromise of the company’s mobile app. It also highlights the trend of blacklisted apps masquerading as or associating themselves with Bitcoin exchanges, Bitcoin wallets, or just “cryptocurrency” in general.
Q1 2019 key findings include:
Security teams need a solution that helps them quickly find, analyze, and mitigate cyber threats to their official, unofficial, and rogue mobile apps, and take corrective action with app stores from inside the platform. By discovering apps across hundreds of mobile app stores and monitoring them for malware or compromise, security personnel can maintain a secure mobile presence as well as the trust of their customers and prospect.
RiskIQ continuously scans hundreds of mobile app stores and millions of apps to safeguard your brand reputation and customers by detecting malware, application tampering, and brand impersonation. For each customer, RiskIQ creates a complete inventory of mobile assets that are related to the bank, official and unknown, across the global mobile app ecosystem. This process includes monitoring for new apps, existing apps, app updates, and rogue or fraudulent apps.
For specific metrics or to learn more, download the RiskIQ Mobile Threat Landscape Q1 2018 Report here.
RiskIQFollow
Apple disputes Google's accuracy on recent iOS hacks, and they may be right -agree with Apple on this one -also think Apple was wrong for not notifying users back when it learned of the attacks -features some insight from @ydklijnsma https://t.co/N3DISYqEdT
RiskIQ's @flibeau comments on how a ‘one for all’ #cybersecurity approach is needed to prevent the spread of #malvertising via @SCmagazineUK, in light of the observation of a series of attacks on WordPress sites using rogue admin accounts https://t.co/qp7aYweZC1
We are delighted to be named a finalist in the Computing Security Awards ‘Enterprise Security Solution of the Year’ category. Show your support by voting for us here @CSMagAndAwards https://t.co/rUETN4xPcA
Pumped to be presenting at #VB2019! I'll be: - Giving an update on the previously disclosed groups - Updates on TTP since the early report - New developments in skimmer "technology" - Interesting new players who joined the game - Undisclosed supply-chain attacks we observed https://t.co/MVkxZlnBUe
@cyberdefensemag Publisher @miliefsky Sharing an important story about Trump’s Cyber security Executive Order #cybersecurity #CYBER #SECURITY in this #CDM #EXCLUSIVE https://t.co/ztcs593TuM by Lou Manousos @RiskIQ who we hope to see @IPEXPO #CDM