Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
To generate phishing pages, attackers can simply save a copy of the login page to their local machine. By doing so, however, attackers can be easily exposed by an embedded HTML artifact called “Mark of the Web”.
In this PT Thursday, we’ll be looking into how RiskIQ pairs our component detection with extracted page attributes to help analysts uncover attacker infrastructure and phishing campaigns. Using the breadcrumbs they leave behind, such as the MarkOfTheWeb, you can pivot on data sets inside RiskIQ PassiveTotal and tap into our repository of internet data to trace the origin of phishing campaigns and their operators.
Watch today to learn:
Click the button below to watch the on-demand webinar.