Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
The digital revolution has caused businesses to venture outside the safety of corporate perimeters into the expanses of the open internet where they can make more frequent and more meaningful touchpoints with employees, prospects, and customers. Unfortunately, this also makes them a target for a new breed of attackers that level internet-scale threats at their digital attack surface, a varied collection of client-facing assets outside the firewall that hackers can and will discover as they research their next threat campaigns.
A significant portion of this digital attack surface is the mobile channel.
To highlight the mobile threat landscape in the third quarter of 2018, RiskIQ applied its crawling platform, which monitors 300+ mobile app stores around the world and leveraged our daily scans of nearly 2 billion resources to look for mobile apps in the wild.
Q3 showed a nearly 220 percent increase in blacklisted apps over Q2—apps matching against at least one blacklist such as VirusTotal, which, per its website, inspects files or web pages with over 70 antivirus products and other tools. A blacklist hit from VirusTotal shows that at least one vendor has flagged the file as suspicious or malicious. However, due to a surge in total apps observed, the percentage of blacklisted apps dropped from 4% in Q2 to 3% in Q3.
Fig-1 Q3 saw a spike in blacklisted mobile apps
With a proactive, store-first scanning mentality, RiskIQ observes and categorizes the threat landscape as a user would see it. Every app we encounter is downloaded, analyzed, and stored. RiskIQ also records changes and new versions of apps as they evolve. In this report, we’ll give an overview of these mobile threats, as well as emerging trends we anticipate will be prevalent in the future, to help you protect yourself and your customers.
Download RiskIQ’s Q3 Mobile Landscape Report for key mobile threat insights including;
RiskIQ automatically runs all mobile applications encountered through a variety of blacklists, including VirusTotal. We differ from other monitoring systems that rely on end users employing their virus scanning tools and/or manual sample submissions. RiskIQ provides discovery across all major app stores as well as more than 150 others, including focused coverage of high-risk stores and regions for brand impersonation, malware, and fraud.
In addition to comprehensive coverage of third-party app stores worldwide, RiskIQ incorporates a unique source of “feral app” binaries, or mobile apps collected outside of dedicated mobile app stores, via drive-by download for example.
To read more about how RiskIQ can help with your mobile security, click here.
RiskIQ is the leader in attack surface management. We help organizations discover, understand, and mitigate exposures across all digital channels.
Wondering where to spend your Monday night at #RSAC 2020? Look no further! RSVP now to come celebrate with Flashpoint, @elastic, @ThreatQuotient, @Siemplify, and @RiskIQ at IGNITE! http://bit.ly/2VrsOpJ
Tomorrow: Stop by the @CrowdStrike booth at 11:30 to see the RiskIQ Illuminate app in action! It analyzes CrowdStrike endpoint coverage and compares it to RiskIQ's unmatched external data to provide a 360-degree view of your attack surface: https://bit.ly/2ujagwt #RSAC2020
The RiskIQ Illuminate app for @CrowdStrike shows your organization's security visibility gaps by analyzing CrowdStrike endpoint coverage and comparing it to @RiskIQ's view of your digital attack surface https://bit.ly/2HFXStG
🛡️#CyberSecurityBrief #Alert: @FTC Refunds Victims Of @OfficeDepot Tech Support Scam via @BleepinComputer @AthertonLab #CyberSecurity #InfoSec #Malware #Ransomware #DDoS #DataBreach #ITsecurity #CyberThreats #CloudSecurity #CyberSecurityInsights https://cybersecurityinsights.substack.com/p/your-friday-morning-cybersecurity?r=63k3&utm_campaign=post&utm_medium=web&utm_source=twitter