Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
You’ve heard of ‘Six Degrees of Kevin Bacon,’ the game that challenges players to connect the prolific actor with any other actor via their film roles in six steps or less. With RiskIQ, we can do the same thing, only using web assets.
What do we mean?
Kevin Bacon is a film actor, not a cyber threat actor. But like cyber threat actors, he has a digital footprint that spans the internet, the assets of which can be linked together and mapped using internet data sets. To prove it, we’ll use PassiveTotal—RiskIQ’s cyber threat research tool—to show how, via eight degrees of web separation, you can link Kevin Bacon to anyone or anything on the internet by pivoting on datasets like:
From country music stars to broken SSL certs to e-cigarette sites, download the white paper to see the connections we made using these critical internet datasets.