LNKR Malware

Background Since beginning data collection in July, this research project has been interested in the types of undesired third-party code that attempt to interact with

The Risks Associated with Abandoned Domains

In the third week of November 2020, The Duke-Sanford research team observed a peculiar spike in undesired third-party code. Of the 674 malware impressions from

Third-Party Risk

Corporate, government, and academic institutions do not have a handle on third-party risk. There is a growing gap between risk and awareness when there should be comprehensive plans in place to deal with third-party vendor risk management. The crucial detail missing from everyone’s radar is this: today, organizations don’t control the code running on their digital properties. In fact, 80-95% of web, app, and e-commerce source code is owned and operated by an entity other than the host organization. This is an area we have to get right. Lack of operational insight provides the ultimate backdoor for bad actors to infiltrate and wreak havoc on consumers. And consumers do not distinguish between you and a third-party vendors when their private information is lost or stolen.

Topics to Follow

Related Industry Analysis