Photon Research Team

Photon Research Team
Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the threats organizations face from cyber criminals and accidental data exposure. See more research at https://resources.digitalshadows.com/photon-research-team. 

Recent Posts by Photon Research Team

Forums are Forever – Part 2: Shaken, but not Stirred

December 10, 2019

  Cybercriminal forums continue to thrive despite law-enforcement takedowns and the emergence of more efficient and secure alternatives. Digital Shadows …

read more

Forums are Forever – Part 1: Cybercrime Never Dies

December 4, 2019

  If one could predict the future back in the late 1990s when the first cybercriminal web forums emerged, few …

read more

Probiv: The missing pieces to a cybercriminal’s puzzle

November 26, 2019

A husband wants to find out who owns the unknown number that’s been ringing his wife’s cell phone late at …

read more

DarkMarket’s Feminist Flight Towards Equality and the Curious Case of Canaries

November 19, 2019

  In late August, Dark Fail (a Tor onion link repository service) added several onion domains for two new dark …

read more

Top Threat Intelligence Podcasts to Add to Your Playlist

October 3, 2019

Looking for some new threat intelligence podcasts to add to your playlist? Look no further! Our Photon Threat Intelligence Research …

read more

Dark Web Monitoring: The Good, The Bad, and The Ugly

September 11, 2019

Dark Web Monitoring Overview Gaining access to dark web and deep web sources can be extremely powerful – if you …

read more

Black Hat and DEFCON 2019 – Some of our Favorite Sessions

August 19, 2019

The team were fortunate to go to Black Hat and DEFCON this year, and we wanted to share back some …

read more

Capital One Breach: What we know and what you can do

July 31, 2019

Monday blues. It’s a thing. It’s when you start the week feeling moody because your weekend is over. The feeling …

read more

The Account Takeover Kill Chain: A Five Step Analysis

July 30, 2019

It’s no secret that credential exposure is a growing problem. Take a look at Troy Hunt’s https://www.haveibeenpwned.com – a tool …

read more

Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser

May 21, 2019

Phishing remains one of the most pervasive threats to enterprise, the simple but effective technique of tricking unassuming users into …

read more