All Posts

Show
Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It
December 12, 2018 read more

Bomb Threat Emails: Extortion Gets Physical

December 14, 2018

We’ve seen yet another change in tactics for the recent spate of extortion campaigns. Whereas before these emails tried to …

read more

Digital Shadows New Integration for Splunk

December 10, 2018

Today we announced the release of an updated version of our Splunk App, which is now certified for both Splunk …

read more

ShadowTalk Update – 12.10.2018

December 10, 2018

In this week’s ShadowTalk, Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott …

read more

Using Shadow Search to Power Investigations: Sextortion Campaigns

December 6, 2018

We recently wrote about sextortion campaigns and how they’ve developed their lures over time. As a result of these campaigns, …

read more

2019 Cyber Security Forecasts: Six Things on the Horizon

December 5, 2018

The new year is upon us! 2018 brought us Spectre and Meltdown, Russian GRU indictments, and the exposure of 500 …

read more

ShadowTalk Update – 12.03.2018

December 3, 2018

Michael Marriott, Dr Richard Gold and Simon Hall discuss our recent findings on threat actors using cracked versions of Cobalt …

read more

Threat Actors Use of Cobalt Strike: Why Defense is Offense’s Child

November 29, 2018

I’m a big fan of the Cobalt Strike threat emulation software. Here at Digital Shadows, it’s a staple of our …

read more

Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework

November 27, 2018

Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it calls the “Essential 8”: a set …

read more

ShadowTalk Update – 11.26.2018

November 26, 2018

With Black Friday kicking off the holiday spending season, Harrison Van Riper, Jamie Collier, and Rafael Amado focus on cyber …

read more

Black Friday and Cybercrime: Retail’s Frankenstein Monster

November 20, 2018

With every year that passes, Black Friday seems to morph into a creation its original proponents could not have even …

read more

Sextortion 2.0: A New Lure

November 20, 2018

Back in September we released a blog about the large volume of sextortion email campaigns that were hitting people’s inboxes. …

read more

ShadowTalk Update – 11.19.2018

November 19, 2018

Leaked court documents surfaced this week detailing how Italian authorities tried and ultimately failed to identify and convict the vigilante …

read more

Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online

November 15, 2018

VIPs and executives who are critical to your company and brand can be targeted by threat actors or groups who …

read more

A Look Back at the ENISA Cyber Threat Intelligence-EU Workshop 2018

November 13, 2018

I recently attended the ENISA (European Union Agency for Network and Information Security) Threat Intelligence Workshop held in Brussels on …

read more

ShadowTalk Update – 11.12.2018

November 12, 2018

In this week’s ShadowTalk, we discuss the big vulnerability and exploit stories of the week. The team discuss the Cisco …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive