All Posts

Show
Detecting Exposed Company Data: The What, Why, and How
March 12, 2019 read more

ShadowTalk Update – 4.15.19

April 15, 2019

Christian and Jamie join Harrison for another week of ShadowTalk to discuss the FIN6 threat actor reportedly widening its range …

read more

Reducing your attack surface

April 9, 2019

What is an attack surface According to OWASP, an attack surface “describes all of the different points where an attacker could …

read more

ShadowTalk Update – 4.8.19

April 8, 2019

Jamie, Alex and Zuko sit down with Harrison to talk about a story that flew a little under the radar …

read more

Easing into the extortion game

April 3, 2019

One of the main ideas which flowed through Photon’s most recent research report, A Tale of Epic Extortions, was that cyber …

read more

Predator: Modeling the attacker’s mindset

April 2, 2019

Author: Richard Gold  The phrases “attacker’s mindset” or “think like an attacker” are often used in cyber security to encourage …

read more

Making Some Noise in the Channel

April 1, 2019

Digital Shadows Channel REV Partner Program shifts into 5th gear and earns the CRN 5-Star Partner Program Guide Award It’s …

read more

ShadowTalk Update – 4.1.19

March 29, 2019

Christian and Jamie sit down with Harrison to talk about the compromised Asus server used to distribute backdoor malware to …

read more

Cyber Risks and High-frequency Trading: Conversation with an Insider

March 26, 2019

Research from the Carnegie Endowment for International Peace published this week focused the attention on how financial systems around the …

read more

ShadowTalk Update – 3.25.19

March 25, 2019

Harrison chats with Jamie and Alex this week on an attack on Norwegian aluminum and renewable-energy company Norsk Hydro ASA. …

read more

Dark Web Typosquatting: Scammers v. Tor

March 21, 2019

Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can …

read more

How to Secure Your Online Brand

March 20, 2019

What is online brand security? As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand …

read more

ShadowTalk Update – 3.18.19

March 18, 2019

Harrison sits down with Rose and Christian for a quick chat about APT40 targeting educational maritime research, as well as …

read more

ShadowTalk Update – 3.11.19

March 11, 2019

This week Jamie and Alex join Harrison to look at Fin6, who has begun regularly targeting card-not-present data on e-commerce …

read more

Purple Teaming with Vectr, Cobalt Strike, and MITRE ATT&CK™

March 6, 2019

Authors: Simon Hall, Isidoros Monogioudis   Here at Digital Shadows we perform regular purple team exercises to continually challenge and …

read more

ShadowTalk Update – 3.04.19

March 4, 2019

This week Rose and Phil join Harrison to discuss a three-stage cryptocurrency mining attack using Mimikatz and Radmin in tandem. …

read more

Don’t Take Our Word for It: See for Yourself Why Forrester Named SearchLight a Leader….For Free!

February 27, 2019

Every day cyber security professionals are bombarded with marketing messages from 3,000+ security vendors. It’s a cacophony of catchy tag …

read more

SamSam But Different: MITRE ATT&CK and the SamSam Group Indictment

February 26, 2019

In our latest research report, A Tale of Epic Extortions, the Digital Shadows Photon Research Team highlight how cybercriminals abuse our …

read more

ShadowTalk Update – 2.25.19

February 25, 2019

This week, Phil and Alex join Harrison to discuss a new malware delivery technique using the Outlook preview panel. Also, …

read more

Extortion Exposed: Sextortion, thedarkoverlord, and SamSam

February 21, 2019

In our most recent research, A Tale of Epic Extortions, the Digital Shadows Photon Research Team approached the topic of …

read more

Six Steps for Security Professionals to make the most out of the RSA Conference

February 20, 2019

This year’s RSA Conference is March 4th-7th in San Francisco. As always, it is a long and exhausting week for …

read more

ShadowTalk Update – 2.18.19

February 19, 2019

Alex and Jamie matched with Harrison in this Valentine’s week episode of ShadowTalk. We discuss why four different APT groups …

read more

Photon Research Team Shines Light On Digital Risks

February 13, 2019

I’m very excited to announce the launch of the Digital Shadows’ Photon Research Team. We have decided to bolster our …

read more

Introducing Our Practical Guide to Reducing Digital Risk

February 12, 2019

Download a copy of A Practical Guide to Reducing Digital Risk   Digital Footprints and Digital Shadows Back when Al …

read more

ShadowTalk Update – 2.11.19

February 8, 2019

Alex and Jamie join Harrison to discuss how the United Arab Emirates (UAE) intelligence services compromised iPhones through the “Karma” …

read more

Understanding Digital Risk Protection

February 8, 2019

There has been a lot of talk recently about Digital Risk and Digital Risk Protection. Forrester published their 2018 New …

read more

CISO Spotlight: Security Goals and Objectives for 2019

February 7, 2019

I recently joined our ShadowTalk podcast to discuss 2019 planning and prioritization. If you listen, you will notice that I’m …

read more

You’ve got a digital strategy, but how are you managing digital risks?

February 7, 2019

Download a free copy of Digital Risk: The C-Suite‘s Critical Missing Part of Overall Risk Most C-level executives I speak …

read more

Joining The Market Leader in Digital Risk Protection

February 6, 2019

Our marketing department asked me to write a blog on why I joined Digital Shadows.  The obvious response would be …

read more

SANS DFIR Cyber Threat Intelligence Summit 2019 – Extracting More Value from Your CTI Program

February 5, 2019

We were fortunate to attend the 2019 SANS DFIR Cyber Threat Intelligence Summit this year, which brings together some of …

read more

ShadowTalk Update – 2.4.19

February 4, 2019

This week, Alex Guirakhoo and Jamie Collier join Harrison to discuss APT39, a new Iran-linked espionage group, as well as …

read more

SingHealth Breach Post-mortem: Key Findings

January 29, 2019

On 10 January 2019, Singaporean authorities finally released a report detailing how the attack against Singapore’s largest group of healthcare …

read more

ShadowTalk Update – 1.28.19

January 26, 2019

This week Rose, Jamie, and Alex talk with Harrison on a huge data dump called “Collection #1”, containing over 770 …

read more

Security Practitioner’s Guide to Email Spoofing and Risk Reduction

January 24, 2019

In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we …

read more

Powering Investigations with Nuix Software: The Case of thedarkoverlord and the 9/11 Files

January 22, 2019

The Panama Papers in 2016 highlighted the challenges facing investigators dealing with large document leaks. With over 11.5 million documents …

read more

ShadowTalk Update – 1.21.19

January 19, 2019

This week, Alex Guirakhoo and Philip Doherty join Harrison Van Riper to discuss two recent, unrelated, financially-motivated cyber attack campaigns …

read more

Don’t Just Read Intelligence: Learn From It

January 17, 2019

The Importance of Learning in Cyber Security Those unfamiliar with the field of computer security, reading the news headlines about …

read more

Thedarkoverlord runs out of Steem

January 16, 2019

On 31 December 2018, the notorious extortion actor known as “thedarkoverlord” announced on Twitter and Reddit that they were in …

read more

ShadowTalk Update – 1.14.19

January 14, 2019

We’ve just released our first Weekly Intelligence Summary episode of ShadowTalk. In this new track, Harrison Van Riper will be …

read more

Security Analyst Spotlight Series: Phil Doherty

January 10, 2019

Organizations rely on Digital Shadows to be an extension of their security team. Our global team of analysts provide relevant …

read more

TV License and Vehicle Tax Fraud: New Year, Same Old Scams

January 8, 2019

Over the last week we’ve been tracking several emails impersonating UK services such as “TV Licensing” and “Vehicle Road Tax”. …

read more

Four New Year Cyber Security Resolutions

January 3, 2019

Another year is upon us in the world of cyber-security, and few things are certain. Commentators are always prone to …

read more

Cyber Threats to Watch in 2019: Key Takeaways from our webinar with the FBI Cyber Squad

December 20, 2018

As 2018 comes to a close, Digital Shadows partnered with the FBI’s Cyber Division for a webinar to discuss some …

read more

The Most Popular Security Blog Topics of 2018

December 18, 2018

It’s been a busy year on the Digital Shadows blog, with almost 150 blogs published since January 1. As we …

read more

ShadowTalk Update – 17.10.2018

December 17, 2018

Following from our recent research, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, the …

read more

Bomb Threat Emails: Extortion Gets Physical

December 14, 2018

We’ve seen yet another change in tactics for the recent spate of extortion campaigns. Whereas before these emails tried to …

read more

Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

December 12, 2018

Overall, the infosec community has done a relatively good job in securing systems. While a measure of restrained back-patting is …

read more

Digital Shadows New Integration for Splunk

December 10, 2018

Today we announced the release of an updated version of our Splunk App, which is now certified for both Splunk …

read more

ShadowTalk Update – 12.10.2018

December 10, 2018

In this week’s ShadowTalk, Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott …

read more

Using Shadow Search to Power Investigations: Sextortion Campaigns

December 6, 2018

We recently wrote about sextortion campaigns and how they’ve developed their lures over time. As a result of these campaigns, …

read more

2019 Cyber Security Forecasts: Six Things on the Horizon

December 5, 2018

The new year is upon us! 2018 brought us Spectre and Meltdown, Russian GRU indictments, and the exposure of 500 …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive