Executive Guardian
Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
When people think of credit card theft, they often think of skimming, point-of-sale devices infected with malware, and large-scale data breaches. But online stores remain one of the most vulnerable means of stealing credit card data.
Last October, we profiled a threat known as Magecart, which injects JavaScript code into e-commerce sites running outdated and unpatched versions of shopping cart software. By logging consumer keystrokes, Magecart captures large quantities of payment card information from unsuspecting shoppers.
In our follow-on report, Magecart Part II: From Javascript Injects to Reshipping for Financial Gain, we take a rare glimpse into the offline world of digital threats. Continued tracking of Magecart activity over the last few months showed how the actors behind it are cashing-in by reshipping items purchased with stolen cards via a physical reshipping company operating with mules in the U.S.
Download the full report for a deep dive into: