All Posts

Show
How cybercriminals are taking advantage of COVID-19: Scams, fraud, and misinformation
March 12, 2020 read more

Surveying the Criminal Market

November 8, 2016

It’s no secret your personal information and data is valuable to cybercriminals, but is there more of a market for …

read more

Overexposed and Under-Prepared; The Risks of Oversharing Online

November 8, 2016

I have a confession to make. I know where you live. I also know who you’re married to and the …

read more

Five Tips For Better Email Security

November 8, 2016

While security is everyone’s responsibility, it’s not always easy to get right. Our “Security Best Practices” blog series will provide …

read more

Resilience: Adapt or Fail

October 28, 2016

“But it ain’t how hard you hit; it’s about how hard you can get hit, and keep moving forward.”- Words …

read more

Anonymous Poland – Not Your Typical Hacktivist Group

October 28, 2016

On October 29, 2016 a Twitter account associated with Anonymous Poland began to post tweets claiming to have compromised the …

read more

Don’t Break the Internet, Fix Your Smart Devices

October 25, 2016

The Distributed Denial of Service (DDoS) attack, which targeted DynDNS servers, and literally ‘broke the internet’ for several hours on …

read more

Rocking the Vote? The Effects of Cyber Activity On The U.S. Election

October 25, 2016

Contrary to some media reporting, our latest research finds that cyber activity during the 2016 U.S. presidential election does not …

read more

Targeting of Elections; Old News, Fresh Tactics

October 25, 2016

There has been no shortage of media coverage surrounding U.S. election and the associated nefarious cyber activity. Amid all this …

read more

Squashing Domain Squatting

October 24, 2016

Digital Shadows was recently the victim of a domain squat attempt. As we eat our own dog food, we thankfully …

read more

Combatting Online Crime With “Needle-Rich Haystacks”

October 18, 2016

At Digital Shadows our analyst team is responsible for providing both tactical situational awareness and broader, strategic awareness to our …

read more

4 Tricks to Make a Cybersecurity Training a Treat

October 12, 2016

A Halloween nightmare: Thunderstorms rage outside. Calendar alerts shriek in unison throughout the room as suspicion and anxiety rises. Lightning …

read more

Digital Risk Monitoring Is A Service, Not a Distinct Capability

October 11, 2016

Digital Shadows was recently recognized as a leader in the Forrester Wave on Digital Risk Monitoring. Digital risk monitoring is …

read more

Balancing the Scales: The PRC’s Shift to Symmetrical Engagement

October 6, 2016

Over the past few years we have observed the beginnings of a fundamental change in how People’s Republic of China …

read more

Do Not Invite Them In: What “Human Error” Can Mean In Practice

October 6, 2016

Although you may or may not be a fan of vampire movies, you certainly know that vampires should not be …

read more

Plumbing the Depths: the Telnet protocol

October 3, 2016

On October 1, 2016 Krebs on Security reported that the source code for the Internet of Things (IoT) botnet malware …

read more

Swotting Up On Exploit Kit Infection Vectors

October 3, 2016

Exploit kit users need to drive web traffic to their landing pages. Without traffic, they can’t exploit vulnerable web users …

read more

Phishful Of Dollars: BEC Remains Top Of The Charts

October 3, 2016

Business email compromise (BEC) is not going away. Since we initially wrote about BEC back in April 2016, we have …

read more

Five Tips To Make Your Passwords Better

September 26, 2016

While security is everyone’s responsibility, it’s not always easy to get right. Our “Security Best Practices” blog series will provide …

read more

Digital Risk Monitoring Can Negate ‘Indicators of Exhaustion’

September 26, 2016

When I first joined Digital Shadows in January, I wrote about the current state of threat intelligence and how “Indicators …

read more

The Industrialized Uses of Breached Data

September 21, 2016

In our first blog, we outlined a number of specific factors that can be used to determine a dataset’s desirability, …

read more

Beauty and the Breach: Leaked Credentials in Context

September 21, 2016

Our analysts recently researched credential compromise, finding more than 5 million leaked credentials online for the world’s biggest 1,000 organizations. Of …

read more

New report: 97 percent of the top 1,000 companies suffer from credential compromise

September 20, 2016

Data breaches and credential compromise are not new. After all, 2014 was known as the “year of the data breach”. …

read more

Three easy tips to staying safe online

September 19, 2016

While security is everyone’s responsibility, it’s not always easy to get right. Our “Security Best Practices” blog series will provide …

read more

Forecasting the exploit kit landscape

September 15, 2016

We’ve previously written on the most popular vulnerabilities that exploit kits are using. But how might the exploit kit market …

read more

Understanding Exploit Kits’ Most Popular Vulnerabilities

September 12, 2016

One significant aspect of mitigating the risk posed by exploit kits is keeping software up-to-date. However, for some organizations, knowing …

read more