Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Digital Shadows

Below you will find reports with the source of “Digital Shadows”

image from Account Takeover In 2022

Account Takeover In 2022

Weak passwords abound, and ATO is interrupting services critical to every aspect of online life: working, streaming, ordering, paying, and just plain connecting. Raising security awareness of this topic can certainly help; but the ATO threat will remain endemic until the problems inherent to password use are resolved.

(more available)
Added: June 24, 2022
image from ERP Applications Under Fire

ERP Applications Under Fire

With hundreds of thousands of implementations across the globe, Enterprise Resource Planning (ERP) applications are supporting the most critical business processes for the biggest organizations in the world. This report is the result of joint research performed by Digital Shadows and Onapsis, aimed to provide insights into how the threat landscape has been evolving over time for ERP applications. We have concentrated our efforts on the two most widely-adopted solutions across the large enterprise segment, SAP and Oracle E-Business Suite, focusing on the risks and threats organizations should care about.

(more available)
Added: December 14, 2018
image from Too Much Information

Too Much Information

In this research, Digital Shadows assessed the sensitive data exposed from some of the most ubiquitous file sharing services across the Internet. We found over twelve petabytes of publicly available data across open Amazon S3 buckets, rsync, SMB, FTP servers, misconfigured websites, and NAS drives.

(more available)
Added: December 5, 2018
image from Seize and Desist?

Seize and Desist?

When law enforcement announced the seizure of AlphaBay in July 2017, the United States Attorney General Jeff Sessions described the operation as: “one of the most important criminal investigations of the year…because of this operation, the American people are safer – safer from the threat of identity fraud and malware, and safer from deadly drugs.” 1 The timing and coordination of the law enforcement operation, known as Operation Bayonet, was a clear success and has contributed to multiple subsequent arrests.2 Almost one year later, the marketplace model appears to be in decline, but the risks to businesses and consumers have not subsided. Instead, this paper demonstrates that cybercriminals have taken to incorporating new processes, technologies, and communication methods to continue their activities.

(more available)
Added: December 5, 2018
image from The Business of Disinformation: A Taxonomy

The Business of Disinformation: A Taxonomy

Since the 2016 U.S. presidential election, the term “fake news” has integrated itself frmly into our daily vernacular. However, fake news is used very broadly to describe: disinformation, propaganda, hoaxes, satire and parody, inaccuracies in journalism, and partisanship. Disinformation campaigns are not limited to the geopolitical realm – its use is far more pervasive. The sheer availability of tools means that barriers to entry are lower than ever. This extends beyond geopolitical to fnancial interests that affect businesses and consumers. This paper presents an overview of these different motivations and tools actors can turn to. In Digital Shadows’ Disinformation Campaign Taxonomy, we lay out the stages used in disinformation campaigns. In doing so, it is possible to develop ways to potentially disrupt these efforts and create greater friction for actors involved.

(more available)
Added: December 5, 2018
image from Patrolling the Dark Net: What You Don't Know Will Hurt You

Patrolling the Dark Net: What You Don't Know Will Hurt You

This e-book provides good insight into understanding cyber crime.

Added: December 5, 2018
image from The New Gold Rush

The New Gold Rush

In light of the new development of Crypto Currency, this paper can begin to address important questions about the outlook for digital currencies, including: If individuals lose trust in alternative coins and no longer see them as profitable, then what does this mean for the future of cryptocurrencies? How will the cryptocurrency landscape change in 2018? And will cryptocurrency fraud ultimately obstruct the rapid growth of digital currencies worldwide?

(more available)
Added: December 5, 2018
image from Advice From The Board: All Companies Should Require Digital Risk Management to Mitigate Corporate Risk

Advice From The Board: All Companies Should Require Digital Risk Management to Mitigate Corporate Risk

The current environment for doing business forces business leaders to face an expanding attack surface, more sophisticated threats and threat actors, and mounting regulatory compliance. These factors are creating a perfect storm that puts your organization and your customers at risk. Now is the time to act. As a Board member or executive, it is not only your goal, but your responsibility to shareholders to protect their interests. The threat to your bottom line from a single incident are significant but a digital risk management strategy can help.

(more available)
Added: December 5, 2018
image from Compromised Credentials: Learn from the exposure of the world's 1000 biggest companies

Compromised Credentials: Learn from the exposure of the world's 1000 biggest companies

The article uses the world’s 1,000 largest companies as a sample to help us better understand the extent to which organizations are effected by cyber threats and how threat actors my be looking to exploit these credentials.

(more available)
Added: October 18, 2018
image from ERP Applications Under Fire: How CyberAttackers Target The Crown Jewels

ERP Applications Under Fire: How CyberAttackers Target The Crown Jewels

This report is the result of joint research performed by Digital Shadows and Onapsis, aimed to provide insights into how the threat landscape has been evolving over time for ERP applications.

(more available)
Added: October 16, 2018
© Cyentia Institute 2025
Library updated: July 9, 2025 00:09 UTC (build b1d7be4)