SpyCloud Resources

2023 Fortune 1000
Report

Fortune 1000 Identity Exposure Report 2023

This year’s analysis of stolen identity data tied to Fortune 1000 companies uncovered shocking amounts of breach and malware-exfiltrated assets that put large enterprises at risk of ransomware and other critical cyber threats.

Read More
Whitepaper

Cybercrime Analytics

Learn about the new way to disrupt cybercrime with automated analytics that drive action. Discover why market leaders across all industries are choosing Cybercrime Analytics over threat intelligence, how this approach boosts anti-fraud solutions, and its use cases and benefits in detail.

Read More
Case Study

Global Computer Manufacturer and Retailer

This Fortune 50 computer manufacturer and retailer incorporated SpyCloud’s automated consumer fraud risk analytics into their security technology stack to reduce manual review and enhance fraud investigations.

Read More
Whitepaper

Disrupting the Ransomware Market

Malware infections siphon valuable data like fresh credentials and web session cookies, giving bad actors the virtual keys to your enterprise. SpyCloud breaks down malware infections and offers context around the steps criminals take with malware-stolen data, and what can be done to stop this insidious threat.

Read More
Whitepaper

Post-Infection Remediation Guide

Post-Infection Remediation is SpyCloud’s new, critical addition to malware infection response. This guide goes in-depth on how to stop malware exposures from becoming full-blown ransomware incidents.

Read More
About-Fraud Webinar
Webinar

Shining a Light Into the Dark Web

On-Demand Webinar: Learn how stolen data makes its way from small circles of bad actors to the dark web and how to identify legitimate consumers interacting with your site vs. criminals leveraging stolen data.

Read More
2022 Ransomware Defense Report Preview
Report

2022 Ransomware Defense Report

Our annual report shows a surprising increase in organizations that experienced multiple ransomware attacks, the costly impacts of ineffective countermeasures, and future plans to improve defenses.

Read More
Malware Infected User Guide
Whitepaper

Infected User Response Guide

Handy guide to decipher what it means when employee or consumer information appears on a botnet log, and how to contact infected users with an action plan.

Read More
Aviation Industry
Case Study

EUROCONTROL

EUROCONTROL protects its 2,000 employees and 1 million constituent accounts on 130 domains from ATO that can lead to ransomware attacks, increases cybersecurity awareness, and provides enormous value to their security program with SpyCloud.

Read More
Ecommerce Marketplace
Case Study

Ecommerce Marketplace

An ecommerce marketplace uses SpyCloud Consumer ATO Prevention to reduce ATO fraud, avoid fraud losses, and reduce resources dedicated to ATO prevention.

Read More
Team Collaboration
Case Study

Atlassian

Atlassian protects its employees and customers from cyberattacks with SpyCloud’s solutions, reducing resource hours spent researching Atlassian’s potential involvement in public breaches and securing its brand reputation.

Read More
2022 SpyCloud Identity Exposure Report
Report

2022 Annual Identity Exposure Report

Our annual reports analyzes the 15.5 billion assets we recaptured from the criminal underground last year, and how enterprises can use this information to protect themselves from ATO, malware, and ransomware, and protect their consumers from online fraud.

Read More
Ransomware Defense Report Preview
Report

2021 Ransomware Defense Report

Our report breaks down the frequency of ransomware attacks on organizations of all sizes, insights on ransomware preparedness measures, and details on the criminal economy that’s fueling ransomware right now.

Read More
Identity Theft 101
Whitepaper

Identity Theft 101

SpyCloud and the Communications Fraud Control Association (CFCA) created this consumer education document to help you understand what identity theft is & how to prevent it.

Read More
MFA Bypass 101 Whitepaper
Whitepaper

MFA Bypass 101

Understand how hackers combine attack methods and stolen credentials to sidestep multi-factor authentication.

Read More
Whitepaper: Understanding the SolarWinds Supply Chain Attack
Whitepaper

Understanding the SolarWinds Supply Chain Attack

The SolarWinds supply chain compromise will have repercussions for years to come. Using witness testimony from the February 23, 2021 Senate Select Committee on Intelligence hearing, we broke down the timeline of the attack and examined how SpyCloud could have helped at each stage.

Read More
Annual Credential Exposure Report
Report

2021 Annual Credential Exposure Report

Over the last 12 months, SpyCloud has recovered 1.5 billion credentials from 854 breach sources. Find out the trends our researchers have observed, including exposed .gov credentials and pandemic-themed keywords in users’ passwords.

Read More
It's a Deal, It's a Steal
Webinar

How the Holidays Affect Dark Web Cybercriminal Activity

The activity we saw on criminal marketplaces during the 2020 holiday shopping season surprised us – huge spikes in the sales of crimeware tools and stolen credentials for particular restaurants, airlines and other consumer services accounts. Get the details in this on-demand webinar.

Read More
financial-services-protection
Case Study

Fortune 100 Financial Services Company

This Fortune 100 financial services company protects millions of financial services consumers from account takeover fraud with SpyCloud, while also enriching their online fraud investigations with SpyCloud data.

Read More
executive-management
Case Study

Global Professional Services Firm

A global professional services firm uses SpyCloud Active Directory Guardian to monitor the credentials of over 6,000 employees across all of the company’s global offices, as well as service providers enrolled in their Active Directory.

Read More
Fintech Account Takeover Prevention Case Study - SpyCloud
Case Study

Global Fintech Company

With SpyCloud, this global fintech platform has been able to automate consumer account takeover prevention at scale, protect thousands of users infected with credential-stealing botnets, and enrich their predictive models and investigations.

Read More
Credential Stuffing Webinar Screenshot
Webinar

How Credential Stuffing Tools Are Made

Learn how credential stuffing works and get insights into the tools of the trade (including some very sophisticated custom Nintendo crimeware). Discover why stolen accounts that don’t have obvious monetary value can be profitable for cybercriminals.

Read More
Graph of new domains related to COVID-19 registered from December 1, 2019 through March 27, 2020
Report

Dataset: COVID-19 Themed Domains

To demonstrate how to complete a low-cost analysis using open-source threat intelligence data, we have compiled and shared a dataset of over 136,000 domains with COVID-19 themes.

Read More
Case Study

Global Managed Services Provider

SpyCloud enabled a global managed services provider to expand the value of their offering by adding credential monitoring services and increasing the quality of their threat intelligence reports—all without hiring additional staff.

Read More
Case Study

Zscaler

Zscaler is a cloud-based security company that is completely transforming the way companies approach information security.

Read More
Case Study

A Large US University

With few resources to dedicate to account takeover prevention, this large US university was settling for a mediocre security solution that required too much manual effort.

Read More
Case Study

University of Oklahoma

With few internal resources or sufficient tools to identify and remediate exposed student, faculty and staff email accounts, OU was at constant risk for accounts being compromised.

Read More
Case Study

Global Networking Company

Discovering exposed user credentials across the global networking company’s many domains proved to be challenging using old, redundant, and undecrypted password data from an incomplete solution.

Read More
Case Study

Top 10 Travel Booking Site

Preventing account takeover begins with monitoring the dark web, but without the ability to match user accounts with a database of exposed credentials, a top 10 travel booking site was vulnerable to attack.

Read More
Case Study

Chemical Company

Preventing a security breach that impacts their customer data is a top priority, yet without credential exposure monitoring & reporting, this company was at constant risk.

Read More
Webinar

6 Myths About Account Takeover

Watch the 6 Myths About Account Takeovers webinar and learn which popular claims are oversold so you can make informed decisions about your own ATO prevention investment.

Read More

Stop exposures from becoming account breaches.