All Posts

Show
Enabling Soi Dog’s Digital Transformation: A Case Study
May 8, 2019 read more

Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser

May 21, 2019

Phishing remains one of the most pervasive threats to enterprise, the simple but effective technique of tricking unassuming users into …

read more

Partnering with SecureLink to help organizations minimize their digital risk

May 15, 2019

Today we announced that SecureLink, one of Europe’s most respected independent cybersecurity and managed service providers, has partnered with Digital …

read more

Mapping Iran’s Rana Institute to MITRE Pre-ATT&CK™ and ATT&CK™

May 15, 2019

The internet has been aflame with discussions around three leaks of internal information from APT groups attributed with the Islamic …

read more

Cyber Talent Gap: How to Do More With Less

May 14, 2019

The challenge facing us today is twofold: not only is the digital footprint of the organizations we want to protect …

read more

ShadowTalk Update – 5.06.19

May 13, 2019

Kacey and Alex join HVR this week to talk through the key stories this week including a new threat group …

read more

Announcing Digital Shadows’ ISO27001 certification

May 7, 2019

I’m pleased to announce that Digital Shadows has recently achieved an important compliance milestone for our customers. After a concerted …

read more

ShadowTalk Update – 5.06.19

May 6, 2019

Phil and newcomer Benjamin Newman join Harrison for another edition of the Weekly Intelligence Summary. The guys cover two distinct …

read more

ShadowTalk Update – 4.29.19

April 29, 2019

Jamie and Alex are back with Harrison this week to talk about the leak of information related to APT34 on …

read more

FBI IC3: Cybercrime Surges in 2018, Causing $2.7 Billion in Losses

April 23, 2019

This week, the Federal Bureau of Investigation released its 2018 Internet Crime Complaints Center (IC3). In 2018, the IC3 responded …

read more

ShadowTalk Update – 4.22.19

April 22, 2019

This week the team discusses an unidentified threat actor that has obtained data from various personal Outlook, MSN, and Hotmail …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive