May 18, 2016

Digital Shadows — new tool helps organisations peer inside data breaches

Posted by in categories: business, cybercrime/malcode, singularity


“We had analysts crawling all over that,” says Chappell of the Hold Security cache. “Quickly it was clear that a lot of those were from previous breaches.”

Anyone using this tool would have had a rapid assessment of their potential exposure. If breached data turns out to be new, the next task is to understand how it might have ended up in the hands of criminals. There are several sources for breached data including straight database theft but also phishing attacks and malware campaigns, each with its own dynamics and set of business implications.

“Instant responders are in a horrible position. They have to work out whether it [the breach] is genuine or not — Google is not effective,” says Chappell.

Read more

Comments are closed.