All Posts

Show
Digital Shadows Opens New State of the Art London Office in Canary Wharf
April 26, 2018 read more

Shadow Talk Update – 05.21.2018

May 21, 2018

In this week’s episode of Shadow Talk, Digital Shadows’ Head of Security Engineering, Dr Richard Gold, joins the pod to …

read more

Patch Priorities: 10 Vulnerabilities You Should Pay Attention To

May 17, 2018

Not all vulnerabilities are created equal, and those that have been exploited by threat actors carry more weight. Last month, …

read more

Digital Shadows 7th Anniversary – A Look Back

May 16, 2018

Today marks the 7th anniversary of Digital Shadows. As James and I looked back on the year, we were amazed …

read more

Shadow Talk Update – 05.14.2018

May 14, 2018

In this week’s episode Shadow Talk we look at the Winnti Umbrella group, asking what this means for organizations. We …

read more

Offsetting Dunbar by Developing Diversity

May 8, 2018

Some of you may be familiar with the Dunbar Number, 150, being the maximum amount of relationships one individual can …

read more

Shadow Talk Update – 05.07.2018

May 7, 2018

In this week’s episode Shadow Talk, it’s a vulnerability extravaganza. We cover malicious use of legitimate software, as APT28 is …

read more

The Other Side of the Counter: DDoS, Social Engineering, Spambots and Insider Risks to Criminal Locations

May 2, 2018

An enduring characteristic of dark web marketplaces is how frequently they’re offline, often through denial of services attacks. While marketplace …

read more

Shadow Talk Update – 04.30.2018

April 30, 2018

In this week’s episode of Shadow Talk, we cover the targeting of healthcare organizations by Orangeworm, BGP hijacking, vulnerabilities in …

read more

Keys to the Kingdom: Exposed Security Assessments

April 24, 2018

Organizations employ external consultants and suppliers to perform assessments and penetration tests that help to bolster their overall internal security. …

read more

Shadow Talk Update – 04.23.2018

April 23, 2018

This week’s Shadow Talk discusses Russia’s attempts to ban the social messaging app, and also read between the lines of the joint US …

read more

Out In The Open: Corporate Secrets Exposed Through Misconfigured Services

April 18, 2018

For organizations dealing with proprietary information or assets, one of the greatest concerns is the threat of competitors getting hold …

read more

When There’s No Need to Hack: Exposed Personal Information

April 17, 2018

With Equifax‘s breach of 145 million records still fresh in everyone’s memory and the recent Facebook data privacy controversy, protecting personal …

read more

Shadow Talk Update – 04.16.2018

April 16, 2018

This week’s Shadow Talk discusses a Cisco Smart Install Client flaw exploited in disruption attack, an information leak vulnerability discovered …

read more

Escalation in Cyberspace: Not as Deniable as We All Seem to Think?

April 12, 2018

The recent assassination attempt on former Russian spy Sergey Skripal has led to a deluge of cyber-based conspiracy theories within …

read more

Leveraging the 2018 Verizon Data Breach Investigations Report

April 10, 2018

Today, the 11th edition of the Verizon Data Breach Investigations Report (DBIR) has been released. This year’s report includes 53,308 …

read more

Introducing Shadow Search – Quickly enable deeper research and investigation

April 10, 2018

All enterprises face key challenges in their quest to protect their organization from cyber threats. One challenge I hear consistently …

read more

Shadow Talk Update – 04.09.2018

April 9, 2018

Back from the Easter break, this week’s Shadow Talk discusses what the re-emergence of WannaCry, exposure of Aggregate IQ data, …

read more

One CISO’s Recommendations for Making the Most of RSA Conference Sessions

April 9, 2018

Last week, Enterprise Strategy Group (ESG) principal analyst, Jon Oltsik, wrote an article for CSO titled: “RSA Conference: CISOs’ top …

read more

When Sharing Is Not Caring: Over 1.5 Billion Files Exposed Through Misconfigured Services

April 5, 2018

Our recent report “Too Much Information”, discovered over 1.5 billion files from a host of services, including Amazon S3 buckets, …

read more

Genesis Botnet: The Market Claiming to Sell Bots That Bypass Fingerprinting Controls

April 3, 2018

An emerging criminal market, Genesis store, provides more effective ways to impersonate a victim’s browser activity, focusing on individual bots …

read more

RSA Conference 2018 – Digital Shadows

March 28, 2018

RSA Conference is almost here! This year’s conference theme is “Now Matters,” looking at the quick impact threats can have …

read more

The Five Families: The Most Wanted Ransomware Groups

March 27, 2018

Last week we presented a webinar on “Emerging Ransomware Threats and How to Protect Your Data”. Here we discussed the latest …

read more

Shadow Talk Update – 03.26.2018

March 26, 2018

This week’s Shadow Talk discusses what the Cambridge Analytica revelations mean for disinformation and personal privacy, updates to Trickbot, Zeus …

read more

Pop-up Twitter Bots: The Shift to Opportunistic Targeting

March 22, 2018

Since the furor surrounding Russia’s alleged use of Twitter bots to influence the 2016 presidential election in the United States, …

read more

Cyber Security as Public Health

March 21, 2018

Public health, one of the great 20th century ideas, has many instructive lessons for cyber security in the 21st. Let’s …

read more