All Posts

Show
Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It
December 12, 2018 read more

Bomb Threat Emails: Extortion Gets Physical

December 14, 2018

We’ve seen yet another change in tactics for the recent spate of extortion campaigns. Whereas before these emails tried to …

read more

Digital Shadows New Integration for Splunk

December 10, 2018

Today we announced the release of an updated version of our Splunk App, which is now certified for both Splunk …

read more

ShadowTalk Update – 12.10.2018

December 10, 2018

In this week’s ShadowTalk, Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott …

read more

Using Shadow Search to Power Investigations: Sextortion Campaigns

December 6, 2018

We recently wrote about sextortion campaigns and how they’ve developed their lures over time. As a result of these campaigns, …

read more

2019 Cyber Security Forecasts: Six Things on the Horizon

December 5, 2018

The new year is upon us! 2018 brought us Spectre and Meltdown, Russian GRU indictments, and the exposure of 500 …

read more

ShadowTalk Update – 12.03.2018

December 3, 2018

Michael Marriott, Dr Richard Gold and Simon Hall discuss our recent findings on threat actors using cracked versions of Cobalt …

read more

Threat Actors Use of Cobalt Strike: Why Defense is Offense’s Child

November 29, 2018

I’m a big fan of the Cobalt Strike threat emulation software. Here at Digital Shadows, it’s a staple of our …

read more

Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework

November 27, 2018

Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it calls the “Essential 8”: a set …

read more

ShadowTalk Update – 11.26.2018

November 26, 2018

With Black Friday kicking off the holiday spending season, Harrison Van Riper, Jamie Collier, and Rafael Amado focus on cyber …

read more

Black Friday and Cybercrime: Retail’s Frankenstein Monster

November 20, 2018

With every year that passes, Black Friday seems to morph into a creation its original proponents could not have even …

read more

Sextortion 2.0: A New Lure

November 20, 2018

Back in September we released a blog about the large volume of sextortion email campaigns that were hitting people’s inboxes. …

read more

ShadowTalk Update – 11.19.2018

November 19, 2018

Leaked court documents surfaced this week detailing how Italian authorities tried and ultimately failed to identify and convict the vigilante …

read more

Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online

November 15, 2018

VIPs and executives who are critical to your company and brand can be targeted by threat actors or groups who …

read more

A Look Back at the ENISA Cyber Threat Intelligence-EU Workshop 2018

November 13, 2018

I recently attended the ENISA (European Union Agency for Network and Information Security) Threat Intelligence Workshop held in Brussels on …

read more

ShadowTalk Update – 11.12.2018

November 12, 2018

In this week’s ShadowTalk, we discuss the big vulnerability and exploit stories of the week. The team discuss the Cisco …

read more

To Pay or Not to Pay: A Large Retailer Responds to DDoS Extortion

November 8, 2018

Fans of The Sopranos or Goodfellas are well-versed in the world of extortion. Whether it is paying off Tony Soprano …

read more

Security Analyst Spotlight Series: Adam Cook

November 7, 2018

Organizations rely on our cyber intelligence analysts to be an extension of their security team. Our global team of analysts provide relevant …

read more

ShadowTalk Update – 11.05.2018

November 5, 2018

In November 2016, Tesco Bank suffered a series of fraud attacks that allowed cybercriminals to check out with £2.26m (roughly …

read more

81,000 Hacked Facebook Accounts for Sale: 5 Things to Know

November 2, 2018

This morning, the British Broadcasting Corporation (BBC) published an article detailing how online actors had obtained and advertised at least …

read more

Choosing the Right Cyber Security Partner for your Business: A glimpse through Digital Logistix journey searching for a Digital Risk Protection Solution

October 31, 2018

This blog was written by Ricardo Martinez, Director of Business Development for Latin America at Digital Logistix. With more than …

read more

The Dark Web: Marketers’ Trick or Threat Intelligence Treat?

October 31, 2018

At this time of the year, you can’t go anywhere without encountering something dark, spooky and mysterious. It all reminds …

read more

ShadowTalk Update – 10.29.2018

October 29, 2018

In this week’s ShadowTalk, Harrison Van Riper and Rafael Amado join Michael Marriott to discuss the latest stories from the …

read more

Cyber Security Awareness Month: Week 4 – Privacy

October 25, 2018

This week in Brussels, Apple’s chief executive Tim Cook somewhat surprisingly castigated how personal data is handled by businesses and …

read more

Bank Discovers Customer Credit Card Numbers Traded Online

October 23, 2018

Payment card fraud costs banks and merchants nearly $23 billion a year and rising. As consumers spend more money online, …

read more

ShadowTalk Update – 10.22.2018

October 22, 2018

In this week’s ShadowTalk, following on from last week’s conversation on how managed service providers can increase your attack surface, …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive