Blog & Resources

The latest advice, opinion and research from our dedicated intelligence analyst team.

No Time for Threat Intel Noise

March 1, 2021 | 5 Min Read

I recently hit my fifth anniversary here at Digital Shadows. I've been reflecting on how the threat intelligence market has evolved since joining. One theme in my analysis is noise. It was a problem...

Access Our Threat Intel In Test Drive

Test Drive SearchLight Free for 7 Days
Try It Now

Connect with us

Q1 Ransomware Roundup

Q1 Ransomware Roundup

April 14, 2021 | 9 Min Read

Consistency is the first word that springs to mind when assessing ransomware activity throughout the Q1 of 2021. There have...
Initial Access Brokers Listings Increasing in 2021

Initial Access Brokers Listings Increasing in 2021

April 13, 2021 | 7 Min Read

Since we first published our report Initial Access Brokers: An Excess of Access, Digital Shadows has continued to monitor this...
The Facebook Data Leak Explained

The Facebook Data Leak Explained

April 8, 2021 | 8 Min Read

This weekend press exposed a significant data leakage containing the records of 533 million Facebook users. The records were posted...
Applying MITRE ATT&CK to your CTI Program

Applying MITRE ATT&CK to your CTI Program

April 7, 2021 | 5 Min Read

In recent years, there’s been an industry-wide movement to look more externally to predict, prevent, and adapt to threats. This...
New Release: Actionable Threat Intelligence with SearchLight

New Release: Actionable Threat Intelligence with SearchLight

April 6, 2021 | 3 Min Read

This year interest in cyber threat intelligence has risen to an all-time high. High profile events such as the Solarwinds...
The Microsoft Exchange Server Exploit: What Happened Next

The Microsoft Exchange Server Exploit: What Happened Next

April 1, 2021 | 9 Min Read

It may be April Fool’s Day, but zero-day exploits detected in Microsoft Exchange Servers are no joke. It’s now been...
3 Reasons to Download our New Cyber Threat Intelligence Solutions Guide

3 Reasons to Download our New Cyber Threat Intelligence Solutions Guide

March 30, 2021 | 3 Min Read

This blog outlines what you can expect to read in our newly-released Cyber Threat Intelligence: Solutions Guide and Best Practices....
Top Blogs of Q1 2021

Top Blogs of Q1 2021

March 30, 2021 | 10 Min Read

It’s safe to say that the first quarter of 2021 gave strong 2020 vibes. As many places are starting to...
Tax and Unemployment Fraud in 2021

Tax and Unemployment Fraud in 2021

March 24, 2021 | 6 Min Read

It’s the most wonderful time of the year! Tax season again. In a decision to assist US taxpayers navigating the...
Arrest, Prosecution, and Incarceration:  The Cybercriminal Perspective

Arrest, Prosecution, and Incarceration: The Cybercriminal Perspective

March 22, 2021 | 10 Min Read

As we highlighted in our recent blog on Cybercriminal Law Enforcement Crackdowns in 2021, this year has been a busy...
FBI IC3 2020: Cybercrime Causes $4.1 Billion in Losses

FBI IC3 2020: Cybercrime Causes $4.1 Billion in Losses

March 18, 2021 | 7 Min Read

On March 17th, the Federal Bureau of Investigation (FBI) published its 2020 Internet Crimes Complaint Center (IC3) report. This report...
Monitoring for Risks Coming From Suppliers: How SearchLight Helps

Monitoring for Risks Coming From Suppliers: How SearchLight Helps

March 18, 2021 | 4 Min Read

For those looking to monitor risks from third parties, it’s been a stressful few months. Back in December, FireEye released...
Smeltdown 2.0: Revisiting the Spectre and Meltdown Vulnerabilities

Smeltdown 2.0: Revisiting the Spectre and Meltdown Vulnerabilities

March 16, 2021 | 8 Min Read

Note: This blog is a revisit on our 2018 coverage of the Spectre and Meltdown vulnerabilities. You can read further...
Mapping MITRE ATT&CK to the Microsoft Exchange Zero-Day Exploits

Mapping MITRE ATT&CK to the Microsoft Exchange Zero-Day Exploits

March 11, 2021 | 7 Min Read

Note: This blog is a part of our MITRE ATT&CK Mapping series in which we map the latest major threat...
Year in Review: COVID-19 Concerns for Cybersecurity

Year in Review: COVID-19 Concerns for Cybersecurity

March 10, 2021 | 7 Min Read

Note: This blog is a follow-up on our remote worker series on navigating security as organizations continue to work from...
Mapping MITRE ATT&CK to the DPRK Financial Crime Indictment

Mapping MITRE ATT&CK to the DPRK Financial Crime Indictment

March 9, 2021 | 8 Min Read

Note: This blog is a part of our MITRE ATT&CK Mapping series in which we map the latest major threat...
The Right to Be Forgotten: Cybercriminal Forum Account Deletion

The Right to Be Forgotten: Cybercriminal Forum Account Deletion

March 4, 2021 | 9 Min Read

We often hear lines like “your past will always catch up with you, no matter how hard you try to...
Cybercriminal Law Enforcement Crackdowns in 2021

Cybercriminal Law Enforcement Crackdowns in 2021

March 2, 2021 | 9 Min Read

Note: This piece is a follow-up on our previous blog, Emotet Disruption: What it Means for the Cyber Threat Landscape,...
No Time for Threat Intel Noise

No Time for Threat Intel Noise

March 1, 2021 | 5 Min Read

I recently hit my fifth anniversary here at Digital Shadows. I’ve been reflecting on how the threat intelligence market has...
How to Monitor Initial Access Broker Listings in SearchLight

How to Monitor Initial Access Broker Listings in SearchLight

February 25, 2021 | 4 Min Read

By now, you might have caught wind of Photon’s new research on Initial Access Brokers (IABs). It’s a pretty awesome,...
Mapping MITRE ATT&CK to Compromised RDP Sales

Mapping MITRE ATT&CK to Compromised RDP Sales

February 23, 2021 | 8 Min Read

Digital Shadows recently published a free research paper titled Initial Access Brokers: An Excess of Access, outlining the emergence of...
The Rise of Initial Access Brokers

The Rise of Initial Access Brokers

February 22, 2021 | 5 Min Read

Over the course of 2020, Digital Shadows detected over 500 cybercriminals’ listings advertising network access across a multitude of industry...
5 Ways to Take Action on Threat Intelligence

5 Ways to Take Action on Threat Intelligence

February 18, 2021 | 5 Min Read

The Gartner definition of threat intelligence is “…evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing...
Threat Intelligence Can Be Noisy: SearchLight Helps

Threat Intelligence Can Be Noisy: SearchLight Helps

February 16, 2021 | 6 Min Read

Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence...
Cybercrime and Valentine’s Day: What to Look Out For

Cybercrime and Valentine’s Day: What to Look Out For

February 10, 2021 | 8 Min Read

Valentine’s Day is fast approaching and for many people that means one thing: going to the app store of their...
Prevent Account Takeover with Our New Exposed Credentials Solutions Guide

Prevent Account Takeover with Our New Exposed Credentials Solutions Guide

February 9, 2021 | 5 Min Read

Note: This blog is taken from our recently published Exposed Credentials Solutions Guide, which includes a complete list of our...
Emotet Disruption: what it means for the cyber threat landscape

Emotet Disruption: what it means for the cyber threat landscape

February 3, 2021 | 8 Min Read

Last week, the European Union Agency for Law Enforcement Cooperation (EUROPOL) published a press release detailing the operation that led...
DarkMarket’s seizure: the decline of the marketplace?

DarkMarket’s seizure: the decline of the marketplace?

February 2, 2021 | 6 Min Read

Once upon a time, a high-profile dark web marketplace seizure or exit scam would have been big news in the...
Joker’s Stash’s Final Deal: A turning point for AVCs?

Joker’s Stash’s Final Deal: A turning point for AVCs?

January 28, 2021 | 12 Min Read

Back in December 2020, Digital Shadows reported that the Blockchain DNS domains for the infamous carding automated vending cart (AVC)...
Brexit 2021: implications for the security landscape

Brexit 2021: implications for the security landscape

January 27, 2021 | 8 Min Read

Ok I’ll admit it, I feel pretty sorry for Boris Johnson. That doesn’t appear to be a particularly common consensus...
Ransomware: Analyzing the data from 2020

Ransomware: Analyzing the data from 2020

January 26, 2021 | 7 Min Read

Note: This blog is a roundup of our quarterly ransomware series. You can also see our Q2 Ransomware Trends, Q3...
ShadowTalk Update: CISA Security Advisory, IObit Attack, and more SolarWinds!

ShadowTalk Update: CISA Security Advisory, IObit Attack, and more SolarWinds!

January 25, 2021 | 2 Min Read

ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence. This week they cover: Adam and...
Threats to Asset and Wealth Management in 2020-2021

Threats to Asset and Wealth Management in 2020-2021

January 21, 2021 | 10 Min Read

Note: Our findings in this blog stem from analysis of all Q4 2020 cyber threat activity by our in-house research...
Our Top 3 Takeaways from Forrester: Now Tech: External Threat Intelligence Services, Q4 2020

Our Top 3 Takeaways from Forrester: Now Tech: External Threat Intelligence Services, Q4 2020

January 20, 2021 | 4 Min Read

When it comes to selecting an external threat intelligence tool or managed service, “plenty of fish in the sea” is...
Azure AD: Auto Validate Exposed Credentials

Azure AD: Auto Validate Exposed Credentials

January 19, 2021 | 3 Min Read

SearchLight customers can now automatically validate credential alerts via an integration with Azure AD, drastically reducing the time required to...
ShadowTalk Update: Sunburst, Sunspot, and more on SolarWinds!

ShadowTalk Update: Sunburst, Sunspot, and more on SolarWinds!

January 18, 2021 | 3 Min Read

ShadowTalk hosts Alec, Charles, Austin, and Ivan bring you the latest in threat intelligence. This week they cover: Significant updates...
Targets and Predictions for the COVID-19 Threat Landscape

Targets and Predictions for the COVID-19 Threat Landscape

January 14, 2021 | 7 Min Read

Note: This blog is part of our ongoing coverage of the virus’s impact on the cyber threat intelligence landscape. You...
Tracing the Rise and Fall of Dark Web Marketplaces and Cybercriminal Forums

Tracing the Rise and Fall of Dark Web Marketplaces and Cybercriminal Forums

January 13, 2021 | 9 Min Read

It’s often the case that a sequel to a great book or a remake of a once-popular TV series doesn’t...
ShadowTalk Update: SolarWinds Updates, TicketMaster Fraud, Apex Cyber Attack, and More!

ShadowTalk Update: SolarWinds Updates, TicketMaster Fraud, Apex Cyber Attack, and More!

January 11, 2021 | 2 Min Read

ShadowTalk hosts Stefano, Adam and Dylan bring you the latest in threat intelligence. This week they cover: Post-holiday updates on...
ICYMI: SolarWinds Compromise Update

ICYMI: SolarWinds Compromise Update

January 8, 2021 | 7 Min Read

Note: This blog is a follow-up of our previous SolarWinds blog by our in-house threat intelligence team. You can read...
Looking back at 2020: A Year in Review

Looking back at 2020: A Year in Review

January 6, 2021 | 8 Min Read

2020 is truly an extraordinary year (and some aspects worse than others). This year was also made up of some...
Top Three SearchLight Updates in 2020

Top Three SearchLight Updates in 2020

December 28, 2020 | 3 Min Read

For threat intelligence to really work for organizations, it must… Be easy to use Be easy to integrate Have dependable...
A Christmas 2020 Review: Confronting and controlling insider threats

A Christmas 2020 Review: Confronting and controlling insider threats

December 21, 2020 | 6 Min Read

As the holidays rapidly approach, our halls are decked with images of Santa Claus. Kids are told stories of his...
QUO, QUO, QUO! Merry Christmas…..

QUO, QUO, QUO! Merry Christmas…..

December 21, 2020 | 7 Min Read

On the first day of Christmas my true love sent to me an index of the dark web for free….....
How Bizarre: Joker’s Stash .bazar site allegedly seized by law enforcement

How Bizarre: Joker’s Stash .bazar site allegedly seized by law enforcement

December 17, 2020 | 6 Min Read

What happened to Joker’s Stash? In a very recent event, the Blockchain domains of Joker’s Stash, an automated vending cart...
Top Five ShadowTalk Episodes of the Year

Top Five ShadowTalk Episodes of the Year

December 17, 2020 | 4 Min Read

Despite everything else happening in the world, 2020 has been an amazing year for ShadowTalk, our weekly threat intelligence podcast...
Holiday Cybercrime: Krampus is in Town

Holiday Cybercrime: Krampus is in Town

December 15, 2020 | 7 Min Read

For the average consumer, Black Friday and holiday shopping look different in 2020. In previous years, we would physically make our...
SolarWinds Compromise: What security teams need to know

SolarWinds Compromise: What security teams need to know

December 14, 2020 | 5 Min Read

The Cybersecurity and Infrastructure Security Agency (CISA) recently released an Emergency Directive reporting on a long-running supply-chain attack actively exploiting...
Digital Shadows’ Top Five Blogs of 2020

Digital Shadows’ Top Five Blogs of 2020

December 10, 2020 | 6 Min Read

Rumour has it that one day I’ll stop being nostalgic around December time and live this month just like any...
Impersonator Syndrome: Supply chain lures and COVID-19 cures

Impersonator Syndrome: Supply chain lures and COVID-19 cures

December 9, 2020 | 3 Min Read

It’s been a tough few months for the healthcare industry (and for all of us in general). While we’ve reported...
How Cybercriminals Answer “What do you do for a living?”

How Cybercriminals Answer “What do you do for a living?”

December 3, 2020 | 8 Min Read

Have you ever wondered how cybercriminals explain their mysterious means of income to others? While not all threat actors’ illicit...
The Top 3 Cybersecurity Threats In The Middle East

The Top 3 Cybersecurity Threats In The Middle East

December 2, 2020 | 7 Min Read

SECURITY CONCERNS ARE HEATING UP IN THE MIDDLE EAST Rising rates of cybercriminal activities occur as threat actors observe the...
2021 Forecasts: Six Trends And Predictions For The New Year

2021 Forecasts: Six Trends And Predictions For The New Year

December 1, 2020 | 18 Min Read

This year has been a real doozy, y’all: Ransomware capitalizing on extortion, operators compromising thousands of organizations, the COVID-19 pandemic...
ShadowTalk Update: Egregor Ransomware, IoT Regulations, Black Friday Threats and More!

ShadowTalk Update: Egregor Ransomware, IoT Regulations, Black Friday Threats and More!

November 30, 2020 | 2 Min Read

ShadowTalk hosts Stefano, Adam and Dylan bring you the latest in threat intelligence. This week they cover: QBot drops Prolock...
Egregor: The New Ransomware Variant to Watch

Egregor: The New Ransomware Variant to Watch

November 24, 2020 | 9 Min Read

INTRODUCING EGREGOR RANSOMWARE GROUP First observed on September 25th, 2020, the Egregor ransomware variant has been making considerable strides in...
SearchLight’s Exposed Document Alerts: Uncover the Critical, Faster

SearchLight’s Exposed Document Alerts: Uncover the Critical, Faster

November 23, 2020 | 5 Min Read

BACKING UP…INTO A DITCH I am a terrible driver. While I’ve sat through Driver’s Ed courses, studied physics and trigonometry,...
Holiday Cybercrime: Retail Risks and Dark Web Kicks

Holiday Cybercrime: Retail Risks and Dark Web Kicks

November 19, 2020 | 7 Min Read

The holidays are right around the corner, and you know what that means – more calories and significant price drops...
ShadowTalk Update: RegretLocker, OceanLotus, Millions Seized in Cryptocurrency, and more!

ShadowTalk Update: RegretLocker, OceanLotus, Millions Seized in Cryptocurrency, and more!

November 16, 2020 | 2 Min Read

ShadowTalk hosts Stefano, Kim, Dylan, and Adam bring you the latest in threat intelligence. This week they cover:  RegretLocker’s approach...
To Code or Not to Code? Cybercriminals and the world of programming

To Code or Not to Code? Cybercriminals and the world of programming

November 12, 2020 | 9 Min Read

If you keep a pulse on the technology sector or have take note of billboard ads in any urban area...
Work Smarter, Not Harder: The Evolution of DDoS Activity in 2020

Work Smarter, Not Harder: The Evolution of DDoS Activity in 2020

November 10, 2020 | 10 Min Read

Ransomware operations have undoubtedly dominated the 2020 cyber threat landscape thanks to multi-million-dollar heists and new malware variants popping up...
A Eulogy for Maze: The end of a ransomware era?

A Eulogy for Maze: The end of a ransomware era?

November 9, 2020 | 6 Min Read

Maze— a high profile ransomware gang in the cybercriminal world— now claims they’ve ceased to exist. The hacker group famed...
Simplifying Cybercriminal Jargon: A Glossary of Cybercriminal Access Offerings

Simplifying Cybercriminal Jargon: A Glossary of Cybercriminal Access Offerings

November 2, 2020 | 15 Min Read

With advertisements for access to compromised victim networks becoming increasingly prevalent across cybercriminal platforms, Digital Shadows has compiled the following...
Ransomware operators targeting healthcare organizations: Monitoring the situation

Ransomware operators targeting healthcare organizations: Monitoring the situation

October 29, 2020 | 9 Min Read

On 28 Oct 2020, in response to large-scale and coordinated attacks by ransomware operators targeting United States-based healthcare services, the...
Mapping MITRE ATT&CK to SandWorm APT’s Global Campaign

Mapping MITRE ATT&CK to SandWorm APT’s Global Campaign

October 28, 2020 | 7 Min Read

On Thursday, October 15th, the United States Department of Justice (DoJ) indicted six Russian military officers connected to the SandWorm...
Cybersecurity Awareness Month: Week 4 – The Future of Connected Devices

Cybersecurity Awareness Month: Week 4 – The Future of Connected Devices

October 28, 2020 | 8 Min Read

This year’s Cybersecurity Awareness Month has served as a refreshing installment of security considerations that are often at risk of...
Foreign cyber threats to the 2020 US presidential election

Foreign cyber threats to the 2020 US presidential election

October 27, 2020 | 12 Min Read

In 2016, Russian nation-state-linked threat actors infamously compromised the Democratic National Convention (DNC), wedging a divide in the political party...
Marcus Carey Joins ShadowTalk

Marcus Carey Joins ShadowTalk

October 23, 2020 | 3 Min Read

We recently had mentor, author, founder, US Navy veteran, and Texan, Marcus Carey join ShadowTalk. For those who don’t know...
Dark pathways into cybercrime: Minding the threat actor talent gap

Dark pathways into cybercrime: Minding the threat actor talent gap

October 21, 2020 | 11 Min Read

Digital Shadows recently published two blogs looking at how threat actors express their personality on cybercriminal forums — either inadvertently...
Cybersecurity Awareness Month: Week 3 – Securing Internet- Connected Devices in Healthcare

Cybersecurity Awareness Month: Week 3 – Securing Internet- Connected Devices in Healthcare

October 21, 2020 | 9 Min Read

The healthcare industry is increasingly relying upon internet-connected devices and solutions to improve patient care, organizational efficiency, crisis response speed,...
Quarterly Update: Ransomware Trends in Q3

Quarterly Update: Ransomware Trends in Q3

October 19, 2020 | 8 Min Read

As we embark on the final months of 2020, ransomware has been the main topic of conversation once again. Throughout...
Digital Shadows Analysis of Europol’s Cybercrime Report

Digital Shadows Analysis of Europol’s Cybercrime Report

October 14, 2020 | 12 Min Read

In early October 2020, Europol released their Internet Organized Crime Threat Assessment (IOCTA) 2020, detailing the latest trends and impacts...
Cybersecurity Awareness Month: Week 2 – Security Devices at Home and Work

Cybersecurity Awareness Month: Week 2 – Security Devices at Home and Work

October 14, 2020 | 7 Min Read

This week, National Cyber Security Awareness Month (NCSAM) focuses on accountability and responsibility behind securing your devices at home and...
Clickbait to Checkmate: SMS-based scam targets US smartphones and accesses victim locations

Clickbait to Checkmate: SMS-based scam targets US smartphones and accesses victim locations

October 13, 2020 | 11 Min Read

Since the start of the COVID-19 pandemic, Digital Shadows has observed a significant increase in the number of SMS-based phishing...
Cybersecurity Awareness Month: Week 1 – If you Connect It, Protect It

Cybersecurity Awareness Month: Week 1 – If you Connect It, Protect It

October 8, 2020 | 6 Min Read

This week marks the opening week of the annual National Cyber Security Awareness Month (NCSAM). While focusing on cybersecurity is...
Help your development teams keep their keys safe

Help your development teams keep their keys safe

October 7, 2020 | 3 Min Read

Modern development practices are a blessing and a curse for organizations. Efficiency gains delivered by distributed workforces, and blended in...
Let’s get ready to tumble! Bitcoin vs Monero

Let’s get ready to tumble! Bitcoin vs Monero

October 6, 2020 | 13 Min Read

Over the past ten years, cryptocurrencies have become the go-to form of payment for the less law-abiding citizens of the...
Recent arrests and high-profile convictions: What does it mean for the cyber threat landscape?

Recent arrests and high-profile convictions: What does it mean for the cyber threat landscape?

September 30, 2020 | 13 Min Read

In the wonderful world of cyber threat intelligence and research, we often analyze the impact that cybercrime or nation-state activity...
Four Ways to Validate Credentials in SearchLight

Four Ways to Validate Credentials in SearchLight

September 29, 2020 | 3 Min Read

Amid the billions of credentials that are breached each year, security teams are focused on one core question: do any...
Cybercriminals Targeting SAP RECON

Cybercriminals Targeting SAP RECON

September 29, 2020 | 5 Min Read

Key takeaways From the discussions that rapidly emerged following the publication of CVE-2020-6287, we can learn the following: There is...
Unpicking Cybercriminals’ Personalities – Part 2:  Morality and Forum Dynamics

Unpicking Cybercriminals’ Personalities – Part 2: Morality and Forum Dynamics

September 28, 2020 | 7 Min Read

In the first part of this blog series, we looked at numerous examples of ways cybercriminals have expressed their gender...
ShadowTalk Update – Law Enforcement Cracks Down On Cybercriminals, Fancy Bear Goes Phishing, And More

ShadowTalk Update – Law Enforcement Cracks Down On Cybercriminals, Fancy Bear Goes Phishing, And More

September 28, 2020 | 2 Min Read

ShadowTalk hosts Kacey, Charles, Alec and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they...
RECAP: Discussing deception  with Chris Sanders

RECAP: Discussing deception with Chris Sanders

September 24, 2020 | 3 Min Read

When I was a Forrester Research analyst, I had some strong opinions on deception technology. Approximately five years ago, I...
Unpicking Cybercriminals’ Personalities – Part 1:  Gender and Nationality

Unpicking Cybercriminals’ Personalities – Part 1: Gender and Nationality

September 23, 2020 | 9 Min Read

It’s easy to fall into the trap of thinking about cybercriminal forums as purely transactional platforms; environments in which cut-throat...
DarkSide: The new ransomware group behind highly targeted attacks

DarkSide: The new ransomware group behind highly targeted attacks

September 22, 2020 | 8 Min Read

We’ve recently observed the emergence of a new ransomware operation named DarkSide. The nuance of the operation includes corporate-like methods...
ShadowTalk Update – Ed Merrett Joins To Talk HackableYou And The Latest In Threat Intel

ShadowTalk Update – Ed Merrett Joins To Talk HackableYou And The Latest In Threat Intel

September 21, 2020 | 2 Min Read

Listen below 👇👇 ShadowTalk Threat Intelligence Podcast · Weekly: The Team Talks Baka, Epic Manchego, and Smaug, Plus Emotet Rides...
With the Empire falling, who will take over the throne?

With the Empire falling, who will take over the throne?

September 16, 2020 | 10 Min Read

With the Empire falling, who will take over the throne? Empire Market’s exit scam has dealt a significant blow to...
Access Keys Exposed: More Than 40% Are For Database Stores

Access Keys Exposed: More Than 40% Are For Database Stores

September 14, 2020 | 6 Min Read

By now, we’ve all heard news about AWS keys leaked by a developer on GitHub. While this can cause damaging...
ShadowTalk Update – The Team Talks Baka, Epic Manchego, and Smaug, Plus Emotet Rides Again

ShadowTalk Update – The Team Talks Baka, Epic Manchego, and Smaug, Plus Emotet Rides Again

September 14, 2020 | 2 Min Read

Listen below 👇👇 ShadowTalk Threat Intelligence Podcast · Weekly: The Team Talks Baka, Epic Manchego, and Smaug, Plus Emotet Rides...
Recruitment fraud: Don’t spook your dream candidates this halloween

Recruitment fraud: Don’t spook your dream candidates this halloween

September 10, 2020 | 4 Min Read

Everyone wants their dream job. Some people get it, others think they’ve found it online… the job post looks appealing:...
Not another ransomware blog: Initial access brokers and their role

Not another ransomware blog: Initial access brokers and their role

September 9, 2020 | 5 Min Read

It’s hard to get very far in cyber threat intelligence without discussing ransomware. Actually, it’s almost impossible. Keeping with the...
Cyber espionage: How to not get spooked by nation-state actors

Cyber espionage: How to not get spooked by nation-state actors

September 8, 2020 | 8 Min Read

In all the years I’ve worked in the cybersecurity field (nine if anyone’s counting), I haven’t seen as much reporting...
ShadowTalk Update – New Zealand Stock Exchange faces DDoS, Tesla avoids cyberattack, and Pioneer Kitten updates

ShadowTalk Update – New Zealand Stock Exchange faces DDoS, Tesla avoids cyberattack, and Pioneer Kitten updates

September 7, 2020 | 2 Min Read

Listen below 👇👇 ShadowTalk Threat Intelligence Podcast · Weekly: New Zealand Stock Exchange faces DDoS, Tesla avoids cyberattack, and Pioneer...
Revisiting Typosquatting and the 2020 US Presidential Election

Revisiting Typosquatting and the 2020 US Presidential Election

September 2, 2020 | 11 Min Read

In October 2019, Digital Shadows’ Photon Research Team embarked on an adventure involving election typosquats that could potentially affect the...
What is DevSecOps and Why Do We Need It?

What is DevSecOps and Why Do We Need It?

August 12, 2020 | 4 Min Read

DevSecOps, SecDevOps, and any variation of those words are massively trending topics in tech companies today. People love to talk...
Dread takes on the spammers – who will come out on top?

Dread takes on the spammers – who will come out on top?

August 28, 2020 | 9 Min Read

Spamming is an irritating and sometimes damaging issue that affects all of us, whether it’s constant emails about dubious products...
Fall of the behemoth: Cybercriminal underground rocked by Empire’s apparent exit scam

Fall of the behemoth: Cybercriminal underground rocked by Empire’s apparent exit scam

August 27, 2020 | 10 Min Read

Summer is generally a relatively quiet time in the cybercriminal underground. It seems that, just like the rest of us,...
“ALEXA, WHO IS THE NUMBER ONE CYBERCRIMINAL FORUM TO RULE THEM ALL?”

“ALEXA, WHO IS THE NUMBER ONE CYBERCRIMINAL FORUM TO RULE THEM ALL?”

August 26, 2020 | 12 Min Read

In June 2020, the administrator of the English-language cybercriminal carding forum Altenen announced a “big victory” for the site in...
RECAP: Discussing the evolution and trends of cybercrime with Geoff White

RECAP: Discussing the evolution and trends of cybercrime with Geoff White

August 25, 2020 | 8 Min Read

In late July 2020, Digital Shadows had the fantastic opportunity to speak with Geoff White on ShadowTalk, Digital Shadows’ threat...
Validate Exposed Credentials with Okta to Save Even More Time

Validate Exposed Credentials with Okta to Save Even More Time

August 24, 2020 | 3 Min Read

SearchLight customers can now automatically validate credential alerts via an integration with Okta, drastically reducing the time required to triage. ...
ShadowTalk Update – Emotet Gets a Vaccine, NSA Drovorub Advisory, and North Korean Activity plus Bureau 121

ShadowTalk Update – Emotet Gets a Vaccine, NSA Drovorub Advisory, and North Korean Activity plus Bureau 121

August 24, 2020 | 3 Min Read

Listen below 👇👇 ShadowTalk Threat Intelligence Podcast · Weekly: Emotet Gets a Vaccine, NSA Drovorub Advisory, and North Korean Activity...