All Posts

Show
The Ecosystem of Phishing: From Minnows to Marlins
February 20, 2020 read more

ShadowTalk Update – OurMine hacks FC Barcelona & Olympics twitter handles, Adsense email extortion, & phishing research

February 24, 2020

Adam and Phil join Viktoria to ‘cause a storm’ on this week’s episode. But first – we get a rundown …

read more

RSA Conference 2020: CISO Tips for Making the Most of Conference Sessions

February 19, 2020

  RSA Conference is just days away, and as I have done in the past, I thought I’d suggest a …

read more

The evolving story of the Citrix ADC Vulnerability: Ears to the Ground

February 18, 2020

  The dust hasn’t quite settled on the Citrix ADC vulnerability technically known as CVE-2019-19781, and affectionately known as “Sh*&rix” …

read more

Cybercriminal Forums on Valentine’s Day – A nice night to “Netflix and steal”…

February 17, 2020

  It’s the night before Valentine’s Day, and it suddenly clicks in your mind that you have totally overlooked one …

read more

ShadowTalk Update – OurMine Hacks, Equifax Indictment, and SWIFT POC attack

February 17, 2020

Roses are red, violets are blue, here’s our threat intel podcast, just for you! Kacey, Charles, Alex, and Harrison have …

read more

The Devil, the Details, and the Analysis of Competing Hypothesis

February 13, 2020

  Digital Shadows’ Photon Research Team recently released a comprehensive examination of the Analysis of Competing Hypothesis (ACH) method, in …

read more

ShadowTalk Update – CTI Frameworks, Wawa Breach Updates, APT34, and Coronavirus Phishing Scams

February 10, 2020

In this week’s episode, Jamie starts by talking about his recent blog, Cyber Threat Intelligence Frameworks, with 5 rules for …

read more

The Iowa Caucus: Third-Party Apps Can Be Risky Business

February 6, 2020

  If you’ve seen HBO’s Silicon Valley, then you’re familiar with the epic fails endured by the Pied Piper team. …

read more

Red Team Blues: A 10 step security program for Windows Active Directory environments

February 6, 2020

  A fun tweet crossed our path recently, the author asked, “Redteam operators: Which defensive settings have you encountered that …

read more

How to Operationalize Threat Intelligence: Actionability and Context

February 5, 2020

  In 1988 the idea of a Computer Emergency Response Team was first introduced at Carnegie Mellon University. Fast-forward through …

read more