All Posts

Show
Forums are Forever – Part 1: Cybercrime Never Dies
December 4, 2019 read more

Threat Intelligence: A Deep Dive

December 12, 2019

  Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a …

read more

Forums are Forever – Part 2: Shaken, but not Stirred

December 10, 2019

  Cybercriminal forums continue to thrive despite law-enforcement takedowns and the emergence of more efficient and secure alternatives. Digital Shadows …

read more

ShadowTalk Update – Cybercriminal Forum Research, Mixcloud Breach, and International Crackdown on RAT Spyware

December 9, 2019

Viktoria invites Stewart Bertram to kick-off this week’s episode around new cybercrime research we put out on the Modern Cybercriminal …

read more

A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias

December 5, 2019

  In an industry prone to going overboard with fear-based marketing, the cyber threat intelligence (CTI) community has a refreshing …

read more

2.3 billion files exposed across online file storage technologies

December 3, 2019

Originally published May 2019 2.3 billion is a massive number. It’s hard even to wrap your head around; what do …

read more

ShadowTalk Update – RIPlace, Trickbot, and Russian-language forum Probiv

December 2, 2019

No ShadowTalk podcast episode this week, but updates from the Intelligence Summary are below. Updates from this week’s Intelligence Summary …

read more

Asset Inventory Management: Difficult But Essential

November 27, 2019

  If it’s one thing that most security professionals can agree on, it’s that asset inventories are one of the …

read more

Probiv: The missing pieces to a cybercriminal’s puzzle

November 26, 2019

A husband wants to find out who owns the unknown number that’s been ringing his wife’s cell phone late at …

read more

ShadowTalk Update – Black Friday Deals on the Dark Web, Phineas Fisher Manifesto, and DarkMarket

November 25, 2019

Adam Cook and Viktoria Austin talk through the security and threat intelligence stories of this week including an update around …

read more

Black Friday Deals on the Dark Web: A cybercriminal shopper’s paradise

November 21, 2019

  Black Friday. You love it, you hate it, you love to hate it. Whether you’re already getting your finances …

read more

DarkMarket’s Feminist Flight Towards Equality and the Curious Case of Canaries

November 19, 2019

  In late August, Dark Fail (a Tor onion link repository service) added several onion domains for two new dark …

read more

BSidesDFW 2019: OSINT Workshop Recap

November 18, 2019

  A few Saturdays ago, we had the pleasure of presenting at BSidesDFW in Fort Worth, Texas. We were all …

read more

ShadowTalk Update – BSidesDFW Recap, Dynamic CVV Analysis, and the Facebook Camera Bug

November 18, 2019

Dallas is sound effects and all this week with Kacey, Charles, Alex, and Harrison. The team discusses their recent OSINT …

read more

VoIP security concerns: Here to stay, here to exploit

November 14, 2019

  VoIP, or Voice over Internet Protocol, is the protocol via which voice communication and multimedia session are delivered via …

read more

Dynamic CVVs: 2FA 2Furious

November 12, 2019

  The security community is quick to highlight the benefits of two-factor authentication (2FA) when it comes to something like …

read more

ShadowTalk Update – BlueKeep Attacks, Megacortex Ransomware, and Web.com Breach

November 11, 2019

This week the London team looks at the following stories: BlueKeep Exploit Could Rapidly Spread Megacortex Ransomware Changes Windows Passwords …

read more

Combatting Domain-Centric Fraud: Why Mimecast is partnering with Digital Shadows

November 7, 2019

This is a guest blog, authored by Matthew Gardiner, Director of Enterprise Security Campaigns at Mimecast Domain fraud is a widespread …

read more

ShadowTalk Update – Avast Breach Attempt, NordVPN Breach, and Wifi Security Risks

November 4, 2019

Adam Cook, Philip Doherty, and Viktoria Austin host this week’s ShadowTalk update around an unsecured Elasticsearch database exposing account information …

read more

Understanding the Different Cybercriminal Platforms: AVCs, Marketplaces, and Forums

October 31, 2019

  With the recent breach that targeted BriansClub, automated vending carts (better known as AVCs), have received significant media attention …

read more

Cybercriminal credit card stores: Is Brian out of the club?

October 31, 2019

  If you’re an avid follower of Digital Shadows’ blogs, or just have a general interest in the cybercriminal landscape, …

read more

Your Cyber Security Career – Press start to begin

October 30, 2019

  October was Cyber Security Awareness month, and as a follow-up, I thought it would be good  to talk about …

read more

Australia Cyber Threat Landscape report (H1 2019)

October 29, 2019

Depending on where you are in the world, October is characterized by the onset of a new season and/or fewer …

read more

ShadowTalk Update – Avast Breach Attempt, NordVPN Breach, and Wifi Security Risks

October 25, 2019

We’ve got all 3 ShadowTalk hosts in Dallas this week: Harrison Van Riper, Viktoria Austin, and Alex Guirakhoo. The team …

read more

Understanding the Consequences of Data Leakage through History

October 24, 2019

One of the most interesting aspects of transitioning from high school history teacher to cyber threat intelligence professional is the …

read more

WiFi Security: Dispelling myths of using public networks

October 23, 2019

We have all seen many articles, blogs, endless Twitter commentary, and so on about the risks of using public WiFi …

read more

Japan Cyber Threat Landscape report (H1 2019)

October 22, 2019

Japan: currently the host of the multi-national sporting event, the Rugby World Cup, and soon to be host of the …

read more

ShadowTalk Update – Typosquatting and the 2020 U.S. Election, Honeypots, And Sudo Vulnerability

October 18, 2019

Kacey, Charles, Harrison, and Alex kick off this week’s episode talking about our Fall Dallas team event (an amateur version …

read more

Honeypots: Tracking Attacks Against Misconfigured or Exposed Services

October 17, 2019

Honeypots can be useful tools for gathering information on current attack techniques. Conversely, they can be an overwhelming source of …

read more

Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

October 16, 2019

Typosquatting. It’s a phrase most of us know in the security realm and think we’ve got our hands and minds …

read more

Cybercriminal Forum Developments: Escrow Services

October 15, 2019

Financial transactions made on cybercriminal forums tend to look remarkably similar to transactions made on legitimate platforms. You have a …

read more

ShadowTalk Update – Iran-linked APT35, Skimming by Magecart 4, Rancour, and Emotet Resurgence

October 11, 2019

We’re back in London this week! Viktoria chats with Adam Cook, Philip Doherty, and Josh Poole on this week’s top …

read more

ANU Breach Report: Mapping to Mitre ATT&CK Framework

October 11, 2019

Introduction This week, the Australian National University (ANU) published a report on an intrusion into their networks that occurred in …

read more

Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

October 9, 2019

In 1984, science fiction writer William Gibson became the father of the Cyberpunk fiction genre with his novel, Neuromancer. Neuromancer …

read more

ShadowTalk Update – Magecart Five Widens Attack Vectors, Suspected Chinese Threat Actor Targets Airbus Suppliers, and Tortoiseshell Developments

October 4, 2019

Coming to you from London this week, Jamie Collier, Philip Doherty, and Josh Poole join Viktoria Austin for our weekly …

read more

Top Threat Intelligence Podcasts to Add to Your Playlist

October 3, 2019

Looking for some new threat intelligence podcasts to add to your playlist? Look no further! Our Photon Threat Intelligence Research …

read more

Domain Squatting: The Phisher-man’s Friend

October 1, 2019

In the past we have talked about the internal assessments that we perform here at Digital Shadows. As part of …

read more

ShadowTalk Update – Tortoiseshell Targets IT Providers, the Tyurin Indictment, and Emotet’s Return

September 27, 2019

Viktoria hosts this week’s episode in London with Phillip Doherty and Adam Cook. After a quick debate around the top …

read more

Singapore Cyber Threat Landscape report (H1 2019)

September 26, 2019

Despite being the second smallest country in Asia, Singapore is a global financial and economic hub. On top of this, …

read more

Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework

September 25, 2019

Between 2012 to mid-2015, U.S. financial institutions, financial services corporations and financial news publishers fell victim to one of the …

read more

SecDevOps: Continued Database Exposures Point to Growing Challenges

September 24, 2019

Last week, we learned that millions of Ecuadorian’s personal details had been exposed by a misconfigured ElasticSearch database. This is …

read more

ShadowTalk Update – Universities still attracting espionage from Iran, SimJacker exploit, NCSC Threat Trends, and Ransomware Updates

September 20, 2019

It’s Harrison and Alex this week for your threat intelligence updates. The guys first dig into the NCSC’s recent threat …

read more

Nemty Ransomware: Slow and Steady Wins the Race?

September 19, 2019

As we outlined recently, ransomware is a key theme of the NCSC Cyber Trends Report: it’s a pervasive threat that …

read more

NCSC Cyber Threat Trends Report: Analysis of Attacks Across UK Industries

September 18, 2019

The United Kingdom’s National Cyber Security Centre (NCSC) recently released their Incident trends report (October 2018 – April 2019) which …

read more

Your Data at Risk: FBI Cyber Division Shares Top Emerging Cyber Threats to Your Enterprise

September 17, 2019

Data breaches are not slowing down. Nobody expects to be a victim, but the data shows the exponential growth in …

read more

ShadowTalk Update – Metasploit Project Publishes Exploit For Bluekeep, plus APT3 and Silence Cybercrime Group Updates

September 13, 2019

Viktoria Austin is joined by Adam Cook and Phil Dohetry this week in the London office to talk about the …

read more

Dark Web Monitoring: The Good, The Bad, and The Ugly

September 11, 2019

Dark Web Monitoring Overview Gaining access to dark web and deep web sources can be extremely powerful – if you …

read more

Mapping the NIST Cybersecurity Framework to SearchLight: Eating our own BBQ

September 10, 2019

Back in February, I wrote about how we avoid the term “eat your own dog food” here at Digital Shadows, …

read more

ShadowTalk Update – Ryuk Ransomware, Twitter rids SMS tweets, and Facebook Records Exposed

September 9, 2019

Alex, Alec, and Harrison are in the room today discussing 3 top stories from the week. First up – a …

read more

Envoy on a Mission to Bring Stability to the Criminal Underground

September 4, 2019

Recent Turbulence in the Underground From the sudden disappearance and ongoing instability issues of KickAss and Torum, to the high …

read more

ShadowTalk Update – More Sodinokibi Activity, Imperva Breach, and Weirdest Food at the Texas State Fair

September 2, 2019

CISO Rick Holland and Alex Guirakhoo join Harrison Van Riper this week to talk through more Sodinokibi activity. Just yesterday, …

read more