Photon Research Team

Photon Research Team

Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the threats organizations face from cyber criminals and accidental data exposure. See more research at https://resources.digitalshadows.com/photon-research-team. 

Recent Posts by Photon Research Team

Predator: Modeling the attacker’s mindset

April 2, 2019

Author: Richard Gold  The phrases “attacker’s mindset” or “think like an attacker” are often used in cyber security to encourage …

read more

Purple Teaming with Vectr, Cobalt Strike, and MITRE ATT&CK™

March 6, 2019

Authors: Simon Hall, Isidoros Monogioudis   Here at Digital Shadows we perform regular purple team exercises to continually challenge and …

read more

Extortion Exposed: Sextortion, thedarkoverlord, and SamSam

February 21, 2019

In our most recent research, A Tale of Epic Extortions, the Digital Shadows Photon Research Team approached the topic of …

read more

SANS DFIR Cyber Threat Intelligence Summit 2019 – Extracting More Value from Your CTI Program

February 5, 2019

We were fortunate to attend the 2019 SANS DFIR Cyber Threat Intelligence Summit this year, which brings together some of …

read more

TV License and Vehicle Tax Fraud: New Year, Same Old Scams

January 8, 2019

Over the last week we’ve been tracking several emails impersonating UK services such as “TV Licensing” and “Vehicle Road Tax”. …

read more

Bomb Threat Emails: Extortion Gets Physical

December 14, 2018

We’ve seen yet another change in tactics for the recent spate of extortion campaigns. Whereas before these emails tried to …

read more

Sextortion 2.0: A New Lure

November 20, 2018

Back in September we released a blog about the large volume of sextortion email campaigns that were hitting people’s inboxes. …

read more

GAO’s Equifax Post-mortem Report

September 11, 2018

It’s common for the exciting and novel issues that confront security professionals on a daily basis to be hyped up. …

read more

Sextortion – When Persistent Phishing Pays Off

September 6, 2018

You may have heard of a recent surge in sextortion-based phishing campaigns. These campaigns seek to extort victims by threatening …

read more

Understanding Threat Modelling

August 29, 2018

What is a threat model? Threat modelling, as defined by OWASP, “works to identify, communicate, and understand threats and mitigations …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive