All Criminals Want for the Holidays is You(r Data): An Inside Look at How Cybercriminals Profit Off the Holiday Season

WEBINAR

All Criminals Want for the Holidays is You(r Data)

An Inside Look at How Cybercriminals Profit Off the Holiday Season

Retailers aren’t the only ones gearing up for the holiday rush — cybercriminals are waiting to get in on the action. The days leading up to and inclusive of Black Friday and Cyber Monday have continuously shown spikes in cybercriminal activity with increases in stolen accounts, gift cards, and other fraudulent purchases and transactions.

But cybercriminals are doing more than gaining access to consumer accounts and making fraudulent transactions. They’re also infecting systems with malware and reselling the logs, creating new avenues for cybercrime.

In this on-demand webinar, SpyCloud researchers share an inside look at the shopping trends they uncovered while monitoring popular cybercriminal communities during the 2021 holiday season and what this means for enterprises who must protect their consumers – and their bottom lines.

Watch the webinar to learn:

  • What gift cards, credentials and other access criminals are buying on the dark web, including price and transaction volume
  • How 2021 trends compare to those of years past
  • How criminals are leveraging malware to impersonate legitimate consumer and evade fraud prevention measures 
  • What enterprises can do to protect themselves and their consumers from account takeover and other follow-on attacks

View the Webinar

All Criminals Want for the Holidays is You(r Data)

A few of our happy customers:

The SpyCloud Difference

SpyCloud offers the earliest possible detection of potentially compromised accounts – those using credentials that have appeared in a third-party breach or are for sale on the dark web and are therefore at risk of account takeover. And we automate the remediation of exposed passwords, enabling enterprises to lock down accounts quickly, before damage is done.

Our goal is to help organizations to protect themselves from criminal activity and disrupt criminals’ ability to profit from stolen data.

stat-blocks-stacked

Check Your Exposure

See your real-time account takeover exposure details powered by SpyCloud data.

Another [1.5] Bites the Dust: Key Learnings from 1.5B Stolen Credentials You Should Never Use Again

WEBINAR

Another [1.5] Bites the Dust: Key Learnings from 1.5B Stolen Credentials You Should Never Use Again

We all want to leave 2020 in the rearview mirror, but the effects will be with us for a long time. Our online behavior shifted dramatically, and we created a number of new accounts to manage our lives in a new reality. This vast growth in the attack surface didn’t go unnoticed in criminal circles, and the tactics they developed to perpetrate breaches and account takeover set the stage for what we’re already starting to see in 2021.

In this on-demand webinar, we break down the trends our researchers observed within cybercriminal communities over the last 12 months, including:

  • The scale of data that was stolen & circulated in 2020
  • What the data reveals about device sharing and the fuzzy boundaries between work and personal device usage
  • The top 100 reused passwords (that you should immediately add to your ‘banned password lists’!)
  • Why and how other companies’ data breaches become your company’s problem
  • Security repercussions of the sudden shift to remote working, learning, socializing, and shopping
2021 Annual Credential Exposure Report

Our 2021 report revealed that password reuse continues to be a serious problem, leaving enterprises and their customers vulnerable to account takeover.

Download the Report

Credential Exposure Alerts

Watch the Webinar

Another [1.5] Bites the Dust: Key Learnings from 1.5B Stolen Credentials You Should Never Use Again

Presenter Info

Chip Witt, Vice President of Product Management

Chip Witt has nearly twenty years of diverse technology experience, including product management and operations leadership roles at Hewlett Packard Enterprise, Webroot, VMware, Alcatel, and Appthority. Chip works closely with field intelligence teams specializing in OSINT and HUMINT tradecraft, actor attribution and underground monitoring.

A few of our happy customers:

The SpyCloud Difference

SpyCloud offers the earliest possible detection of potentially compromised accounts – those using credentials that have appeared in a third-party breach or are for sale on the dark web and are therefore at risk of account takeover. And we automate the remediation of exposed passwords, enabling enterprises to lock down accounts quickly, before damage is done. 

Our goal is to help organizations to protect themselves from criminal activity and disrupt criminals’ ability to profit from stolen data.

stat-blocks-stacked

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.

2021 Remote Workforce Security Report

REPORT

2021 Remote Workforce Security Report

New Security Threats Facing Remote Workers
2021 Remote Workforce Security Report

Following the dramatic rise in work-from-home in the wake of the COVID-19 pandemic, securing the expanding remote workforce has become a critical priority.

The 2021 Remote Workforce Security Report reveals the current state of cybersecurity at widely distributed organizations, including key challenges, new security threats, technology gaps and preferences, investment priorities, and more.

Based on the research, organizations are seeing increased phishing attempts and malware infections. They are concerned about the use of personal, unsecured devices to access corporate applications, and the risk of data leakage presented by a habit so difficult to stop – especially when 55% of organizations allow it.

Download the report for insights & more on:
  • Security controls that are most effective for remote work scenarios
  • Threats users are reporting with increasing frequency
  • Security protocols individuals are most resistant to
  • How remote work is impacting compliance posture, especially regarding GDPR
Examine what your peers think about the ongoing threats and vulnerabilities faced by enterprises today, and where you might need to shore up your defenses for the future – because remote work is a trend very likely to continue.

Get the Report

2021 Remote Workforce
Security Report
Download the PDF version of the report to print or share with others.

The SpyCloud Difference

Truly Actionable Recaptured Data

SpyCloud solutions are backed by the world’s most current and comprehensive repository of recaptured data from breaches, malware infections, and other underground sources – with billions of exposed credentials and PII. It’s the same data that fraudsters use, but we make it actionable to prevent account takeover, ransomware attacks, and online fraud.

stat-blocks-stacked

Check Your Exposure

See your real-time account takeover exposure details powered by SpyCloud data.

How the Holidays Affect Dark Web Cybercriminal Activity

WEBINAR

It’s a Deal, It’s a Steal: How the Holidays Affect Dark Web Cybercriminal Activity

It's a Deal, It's a Steal

It should be no surprise that cybercriminal activity spikes around the holidays. Low holiday prices and high online traffic provide criminals the perfect opportunity to blend in with legitimate shoppers to take over accounts, use stored payment information or stolen gift cards to make fraudulent purchases, and exploit Buy Online, Pick Up in Store (BOPIS) policies.

But what we saw during the month of November on dark web criminal marketplaces surprised us – huge spikes in the sales of crimeware tools, dating accounts, and stolen credentials for particular restaurants, airlines and other consumer services accounts.

Watch the on-demand webinar to see SpyCloud’s annual research into holiday shopping trends across criminal ecommerce platforms, including:

  • What criminals bought, what prices they paid, and what volume of illegal merchandise exchanged hands around Black Friday
  • Which industries and account types were the most popular with cybercriminals 
  • How 2020 trends compared to what we saw in 2019
  • What enterprises can do to protect themselves and their consumers from online fraud
Solution: Consumer ATO Prevention

Protect your users from account takeover fraud and unauthorized purchases.

Learn More

Watch the Webinar

It’s a Deal, It’s a Steal: How the Holidays Affect Dark Web Cybercriminal Activity

The SpyCloud Difference

SpyCloud offers the earliest possible detection of potentially compromised accounts – those using credentials that have appeared in a third-party breach or are for sale on the dark web and are therefore at risk of account takeover. And we automate the remediation of exposed passwords, enabling enterprises to lock down accounts quickly, before damage is done. 

Our goal is to help organizations to protect themselves from criminal activity and disrupt criminals’ ability to profit from stolen data.

stat-blocks-stacked

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.

Innovation on the Dark Web

REPORT

Innovation on the Dark Web

Third-Generation Markets and How Bad Actors are Keeping Pace

The largest dark markets may have been seized, but new ones are always popping up. This SpyCloud Research Report demystifies the markets selling everything from drugs and guns to stolen credentials.

Download this report to learn:

  • The difference between the deep web and dark web
  • How today’s darknet markets have been influenced—for better or for worse—by their predecessors
  • The security measures on new markets that keep transactions “safe” and anonymous

Download the Report:

Innovation on the Dark Web

A few of our happy customers:

Related Resources

Webinar

6 Myths About Account Takeover

Watch the 6 Myths About Account Takeovers webinar and learn which popular claims are oversold so you can make informed decisions about your own ATO prevention investment.

Read More

The SpyCloud Difference

Truly Actionable Recaptured Data

SpyCloud solutions are backed by the world’s most current and comprehensive repository of recaptured data from breaches, malware infections, and other underground sources – with billions of exposed credentials and PII. It’s the same data that fraudsters use, but we make it actionable to prevent account takeover, ransomware attacks, and online fraud.

stat-blocks-stacked

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.

Understanding the Underground Market for Stolen Credentials

REPORT

Understanding the Underground Market for Stolen Credentials

Account Takeover & the Darknet

Even after the fall of the large darknet markets, such as Hansa and AlphaBay, there still exists a sophisticated underground ecosystem that thrives upon the sale and trade of stolen credentials. The fall of these markets represented a paradigm shift in how credentials are bought and sold on the underground. Phishing and spear-phishing attacks are becoming increasingly sophisticated and that’s just the tip of the iceberg.

Download this SpyCloud report o read our experts’ breakdown of how the underground market operates, how it is changing, and what can be done to protect you and your company.

Download the Report:

Understanding the Underground Market for Stolen Credentials​

A few of our happy customers:

Related Resources

The SpyCloud Difference

Truly Actionable Recaptured Data

SpyCloud solutions are backed by the world’s most current and comprehensive repository of recaptured data from breaches, malware infections, and other underground sources – with billions of exposed credentials and PII. It’s the same data that fraudsters use, but we make it actionable to prevent account takeover, ransomware attacks, and online fraud.

stat-blocks-stacked

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.