Michael Marriott is a Senior Strategy and Research Analyst at Digital Shadows, which he joined in late 2014. Michael has a passion for security analysis and the trends they indicate, in order to better protect clients. He has written several articles and papers, and his research is regularly features in the press. He holds a BA in History and a Masters in Applied Security and Strategy, both from the University of Exeter.
Michael Marriott
1


How to Monitor Initial Access Broker Listings in SearchLight
February 25, 2021 | 4 Min Read

Impersonator Syndrome: Supply chain lures and COVID-19 cures
December 9, 2020 | 3 Min Read

Four Ways to Validate Credentials in SearchLight
September 29, 2020 | 3 Min Read

Cybercriminals Targeting SAP RECON
September 29, 2020 | 5 Min Read

Access Keys Exposed: More Than 40% Are For Database Stores
September 14, 2020 | 6 Min Read

Validate Exposed Credentials with Okta to Save Even More Time
August 24, 2020 | 3 Min Read

Jira Atlassian SearchLight Integration
July 21, 2020 | 2 Min Read

SearchLight’s Credential Validation: Only Focus on What Matters
July 14, 2020 | 4 Min Read

Tax Fraud in 2020: Down But Not Out
July 13, 2020 | 4 Min Read

Security Threat Intel Products and Services: Mapping SearchLight
June 10, 2020 | 6 Min Read

Asset Inventory Management: Difficult But Essential
November 27, 2019 | 4 Min Read

Nemty Ransomware: Slow and Steady Wins the Race?
September 19, 2019 | 3 Min Read

Emotet Returns: How To Track Its Updates
August 26, 2019 | 5 Min Read

Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers
July 2, 2019 | 6 Min Read

Managing Digital Risk: 4 Steps to Take
June 18, 2019 | 9 Min Read

Partnering with SecureLink to help organizations minimize their digital risk
May 15, 2019 | 3 Min Read

Reducing your attack surface
April 9, 2019 | 4 Min Read

How to Secure Your Online Brand
March 20, 2019 | 4 Min Read

Detecting Exposed Company Data: The What, Why, and How
March 12, 2019 | 3 Min Read

Understanding Digital Risk Protection
February 8, 2019 | 3 Min Read

The Most Popular Security Blog Topics of 2018
December 18, 2018 | 3 Min Read

Digital Shadows New Integration for Splunk
December 10, 2018 | 3 Min Read

Using Shadow Search to Power Investigations: Sextortion Campaigns
December 6, 2018 | 3 Min Read

Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online
November 15, 2018 | 2 Min Read

The Dark Web: Marketers’ Trick or Threat Intelligence Treat?
October 31, 2018 | 5 Min Read

Bank Discovers Customer Credit Card Numbers Traded Online
October 23, 2018 | 3 Min Read

Phishing Site Impersonates Financial Services Institution
October 10, 2018 | 3 Min Read

33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy
October 9, 2018 | 4 Min Read

Business Email Compromise: When You Don’t Need to Phish
October 4, 2018 | 4 Min Read

10 Things You Didn’t Know You Could Do with Shadow Search™
September 25, 2018 | 5 Min Read

Online Risks to Fortnite Users
September 4, 2018 | 5 Min Read

Five Threats to Financial Services: Part Five, Hacktivism
August 15, 2018 | 5 Min Read

Five Threats to Financial Services: Part Four, Payment Card Fraud
August 14, 2018 | 6 Min Read

Cyber Threats to ERP Applications: Threat Landscape
July 24, 2018 | 4 Min Read

Five Threats to Financial Services: Banking Trojans
July 19, 2018 | 5 Min Read

How Cybercriminals are Using Messaging Platforms
June 21, 2018 | 4 Min Read

Five Threats to Financial Services: Part One, Insiders
June 19, 2018 | 5 Min Read

When There’s No Need to Hack: Exposed Personal Information
April 17, 2018 | 4 Min Read

When Sharing Is Not Caring: Over 1.5 Billion Files Exposed Through Misconfigured Services
April 5, 2018 | 4 Min Read

It’s Accrual World: Tax Return Fraud in 2018
March 7, 2018 | 5 Min Read

Protecting Your Brand: Return on Investment
February 27, 2018 | 3 Min Read

Cryptojacking: An Overview
February 13, 2018 | 5 Min Read

Four Ways Criminals Are Exploiting Interest in Initial Coin Offerings
February 1, 2018 | 5 Min Read

Another Year Wiser: Key Dates to Look Out For In 2018
January 10, 2018 | 4 Min Read

GDPR: Why You Need to Consider the Personal Data That Lies Outside of Your Organization
January 4, 2018 | 3 Min Read

Digital Shadows’ Most Popular Blogs of 2017: Analysis of Competing Hypotheses For The Win
December 12, 2017 | 3 Min Read

Fake News is More Than a Political Battlecry
November 16, 2017 | 3 Min Read

Gearing Up For National Cyber Security Awareness Month
October 3, 2017 | 4 Min Read

Fraudsters Scoring Big – an Inside Look at the Carding Ecosystem
July 18, 2017 | 3 Min Read

7 Tips for Protecting Against Account Takeovers
May 22, 2017 | 3 Min Read

The 3 Pillars of Digital Risk Management: Part 3 – The Top 5 Main Risks of Reputational Damage
April 27, 2017 | 2 Min Read

The 3 Pillars of Digital Risk Management: Part 2 – The 6 Main Areas That Contribute to Data Leakage Risks
April 18, 2017 | 2 Min Read

The 3 Pillars of Digital Risk Management: Part 1 Understanding Cyber Threats
April 13, 2017 | 3 Min Read

5 Risks Posed By Mobile Applications That SearchLight Helps You Manage
March 14, 2017 | 2 Min Read

Learning from the Top Threats Financial Services Faced in 2016
March 8, 2017 | 2 Min Read

Known Unknowns: Key Events to Keep Your Eyes Out for in 2017
January 19, 2017 | 3 Min Read

10 Ways You Can Prepare for DDoS Attacks in 2017
January 11, 2017 | 1 Min Read

Crowdsourced DDoS Extortion – A Worrying Development?
December 13, 2016 | 3 Min Read

Top 5 Threats to the Media and Broadcasting Industry
November 11, 2016 | 3 Min Read

Rocking the Vote? The Effects of Cyber Activity On The U.S. Election
October 25, 2016 | 5 Min Read

Targeting of Elections; Old News, Fresh Tactics
October 25, 2016 | 4 Min Read

New report: 97 percent of the top 1,000 companies suffer from credential compromise
September 20, 2016 | 2 Min Read

Forecasting the exploit kit landscape
September 15, 2016 | 5 Min Read

Understanding Exploit Kits’ Most Popular Vulnerabilities
September 12, 2016 | 2 Min Read

Bozkurt to Buhtrap: Cyber threats affecting financial institutions in 1H 2016
August 23, 2016 | 3 Min Read

Getting In Gear: Accounting for Tactical and Strategic Intelligence
July 26, 2016 | 3 Min Read

Three Tactics Behind Cyber Extortion
July 11, 2016 | 3 Min Read

Shining a light on the dark web
June 21, 2016 | 3 Min Read

Your money or your data: Keeping up-to-date with the innovation
June 17, 2016 | 2 Min Read

The Plan is Mightier than the Sword – Re(sources)
May 24, 2016 | 3 Min Read

The Plan is Mightier than the Sword – Persistence
May 24, 2016 | 5 Min Read

The Plan is Mightier than the Sword – Planning
May 24, 2016 | 4 Min Read

OpIcarus – Increased Claims Against Financial Institutions
May 23, 2016 | 3 Min Read

Goliath ransomware, giant problem or giant con?
May 17, 2016 | 3 Min Read

The Hacking Team breach – an attacker’s point of view
April 22, 2016 | 3 Min Read

OpIsrael: An Update
April 6, 2016 | 3 Min Read

Antifragile Security: Bouncing Back Stronger
March 21, 2016 | 3 Min Read

A Complex Threat Landscape
January 13, 2016 | 2 Min Read

TalkTalk Information Likely to be Discoverable on The Dark Web
December 4, 2015 | 3 Min Read

Crackas With Attitude: What We’ve Learned
November 23, 2015 | 3 Min Read

Smilex: Dangers of Poor OpSec
October 27, 2015 | 3 Min Read

Online Carding
October 7, 2015 | 3 Min Read