Uncovering Confidential Documents, Access Keys and Credentials

Presented by

Matthew Quinn, Senior Sales Engineer, Digital Shadows

About this talk

Research has shown that prominent threat actors, including the well documented ShinyHunters and GnosticPlayers, are targeting organizations globally by identifying exposed infrastructure access keys such as AWS and Oracle on sources such as GitHub to gain access to customer data, as well as identifying and download exposed customer data from exposed storage such as Amazon S3 Buckets, RSYNC and SMB servers. This presentation by Digital Shadows details how these problems arise in the first place, how to detect them, and how to mitigate against from them occurring again in the future.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (233)
Subscribers (6342)
Digital Shadows SearchLight protects organizations against external risk exposure. Organizations register their company names, brand names, domains, and document marketings for monitoring. Through the SearchLight portal, we provide the most relevant and critical digital risks with complete visibility, context, recommended actions, and ways to remediate the risk.