All Posts

Show
Understanding Digital Risk Protection
February 8, 2019 read more

Photon Research Team Shines Light On Digital Risks

February 13, 2019

I’m very excited to announce the launch of the Digital Shadows’ Photon Research Team. We have decided to bolster our …

read more

Introducing Our Practical Guide to Reducing Digital Risk

February 12, 2019

Download a copy of A Practical Guide to Reducing Digital Risk   Digital Footprints and Digital Shadows Back when Al …

read more

ShadowTalk Update – 2.11.19

February 8, 2019

Alex and Jamie join Harrison to discuss how the United Arab Emirates (UAE) intelligence services compromised iPhones through the “Karma” …

read more

CISO Spotlight: Security Goals and Objectives for 2019

February 7, 2019

I recently joined our ShadowTalk podcast to discuss 2019 planning and prioritization. If you listen, you will notice that I’m …

read more

You’ve got a digital strategy, but how are you managing digital risks?

February 7, 2019

Download a free copy of Digital Risk: The C-Suite‘s Critical Missing Part of Overall Risk Most C-level executives I speak …

read more

Joining The Market Leader in Digital Risk Protection

February 6, 2019

Our marketing department asked me to write a blog on why I joined Digital Shadows.  The obvious response would be …

read more

SANS DFIR Cyber Threat Intelligence Summit 2019 – Extracting More Value from Your CTI Program

February 5, 2019

We were fortunate to attend the 2019 SANS DFIR Cyber Threat Intelligence Summit this year, which brings together some of …

read more

ShadowTalk Update – 2.4.19

February 4, 2019

This week, Alex Guirakhoo and Jamie Collier join Harrison to discuss APT39, a new Iran-linked espionage group, as well as …

read more

SingHealth Breach Post-mortem: Key Findings

January 29, 2019

On 10 January 2019, Singaporean authorities finally released a report detailing how the attack against Singapore’s largest group of healthcare …

read more

ShadowTalk Update – 1.28.19

January 26, 2019

This week Rose, Jamie, and Alex talk with Harrison on a huge data dump called “Collection #1”, containing over 770 …

read more

Security Practitioner’s Guide to Email Spoofing and Risk Reduction

January 24, 2019

In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we …

read more

Powering Investigations with Nuix Software: The Case of thedarkoverlord and the 9/11 Files

January 22, 2019

The Panama Papers in 2016 highlighted the challenges facing investigators dealing with large document leaks. With over 11.5 million documents …

read more

ShadowTalk Update – 1.21.19

January 19, 2019

This week, Alex Guirakhoo and Philip Doherty join Harrison Van Riper to discuss two recent, unrelated, financially-motivated cyber attack campaigns …

read more

Don’t Just Read Intelligence: Learn From It

January 17, 2019

The Importance of Learning in Cyber Security Those unfamiliar with the field of computer security, reading the news headlines about …

read more

Thedarkoverlord runs out of Steem

January 16, 2019

On 31 December 2018, the notorious extortion actor known as “thedarkoverlord” announced on Twitter and Reddit that they were in …

read more

ShadowTalk Update – 1.14.19

January 14, 2019

We’ve just released our first Weekly Intelligence Summary episode of ShadowTalk. In this new track, Harrison Van Riper will be …

read more

Security Analyst Spotlight Series: Phil Doherty

January 10, 2019

Organizations rely on Digital Shadows to be an extension of their security team. Our global team of analysts provide relevant …

read more

TV License and Vehicle Tax Fraud: New Year, Same Old Scams

January 8, 2019

Over the last week we’ve been tracking several emails impersonating UK services such as “TV Licensing” and “Vehicle Road Tax”. …

read more

Four New Year Cyber Security Resolutions

January 3, 2019

Another year is upon us in the world of cyber-security, and few things are certain. Commentators are always prone to …

read more

Cyber Threats to Watch in 2019: Key Takeaways from our webinar with the FBI Cyber Squad

December 20, 2018

As 2018 comes to a close, Digital Shadows partnered with the FBI’s Cyber Division for a webinar to discuss some …

read more

The Most Popular Security Blog Topics of 2018

December 18, 2018

It’s been a busy year on the Digital Shadows blog, with almost 150 blogs published since January 1. As we …

read more

ShadowTalk Update – 17.10.2018

December 17, 2018

Following from our recent research, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, the …

read more

Bomb Threat Emails: Extortion Gets Physical

December 14, 2018

We’ve seen yet another change in tactics for the recent spate of extortion campaigns. Whereas before these emails tried to …

read more

Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

December 12, 2018

Overall, the infosec community has done a relatively good job in securing systems. While a measure of restrained back-patting is …

read more

Digital Shadows New Integration for Splunk

December 10, 2018

Today we announced the release of an updated version of our Splunk App, which is now certified for both Splunk …

read more

ShadowTalk Update – 12.10.2018

December 10, 2018

In this week’s ShadowTalk, Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott …

read more

Using Shadow Search to Power Investigations: Sextortion Campaigns

December 6, 2018

We recently wrote about sextortion campaigns and how they’ve developed their lures over time. As a result of these campaigns, …

read more

2019 Cyber Security Forecasts: Six Things on the Horizon

December 5, 2018

The new year is upon us! 2018 brought us Spectre and Meltdown, Russian GRU indictments, and the exposure of 500 …

read more

ShadowTalk Update – 12.03.2018

December 3, 2018

Michael Marriott, Dr Richard Gold and Simon Hall discuss our recent findings on threat actors using cracked versions of Cobalt …

read more

Threat Actors Use of Cobalt Strike: Why Defense is Offense’s Child

November 29, 2018

I’m a big fan of the Cobalt Strike threat emulation software. Here at Digital Shadows, it’s a staple of our …

read more

Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework

November 27, 2018

Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it calls the “Essential 8”: a set …

read more

ShadowTalk Update – 11.26.2018

November 26, 2018

With Black Friday kicking off the holiday spending season, Harrison Van Riper, Jamie Collier, and Rafael Amado focus on cyber …

read more

Black Friday and Cybercrime: Retail’s Frankenstein Monster

November 20, 2018

With every year that passes, Black Friday seems to morph into a creation its original proponents could not have even …

read more

Sextortion 2.0: A New Lure

November 20, 2018

Back in September we released a blog about the large volume of sextortion email campaigns that were hitting people’s inboxes. …

read more

ShadowTalk Update – 11.19.2018

November 19, 2018

Leaked court documents surfaced this week detailing how Italian authorities tried and ultimately failed to identify and convict the vigilante …

read more

Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online

November 15, 2018

VIPs and executives who are critical to your company and brand can be targeted by threat actors or groups who …

read more

A Look Back at the ENISA Cyber Threat Intelligence-EU Workshop 2018

November 13, 2018

I recently attended the ENISA (European Union Agency for Network and Information Security) Threat Intelligence Workshop held in Brussels on …

read more

ShadowTalk Update – 11.12.2018

November 12, 2018

In this week’s ShadowTalk, we discuss the big vulnerability and exploit stories of the week. The team discuss the Cisco …

read more

To Pay or Not to Pay: A Large Retailer Responds to DDoS Extortion

November 8, 2018

Fans of The Sopranos or Goodfellas are well-versed in the world of extortion. Whether it is paying off Tony Soprano …

read more

Security Analyst Spotlight Series: Adam Cook

November 7, 2018

Organizations rely on our cyber intelligence analysts to be an extension of their security team. Our global team of analysts provide relevant …

read more

ShadowTalk Update – 11.05.2018

November 5, 2018

In November 2016, Tesco Bank suffered a series of fraud attacks that allowed cybercriminals to check out with £2.26m (roughly …

read more

81,000 Hacked Facebook Accounts for Sale: 5 Things to Know

November 2, 2018

This morning, the British Broadcasting Corporation (BBC) published an article detailing how online actors had obtained and advertised at least …

read more

Choosing the Right Cyber Security Partner for your Business: A glimpse through Digital Logistix journey searching for a Digital Risk Protection Solution

October 31, 2018

This blog was written by Ricardo Martinez, Director of Business Development for Latin America at Digital Logistix. With more than …

read more

The Dark Web: Marketers’ Trick or Threat Intelligence Treat?

October 31, 2018

At this time of the year, you can’t go anywhere without encountering something dark, spooky and mysterious. It all reminds …

read more

ShadowTalk Update – 10.29.2018

October 29, 2018

In this week’s ShadowTalk, Harrison Van Riper and Rafael Amado join Michael Marriott to discuss the latest stories from the …

read more

Cyber Security Awareness Month: Week 4 – Privacy

October 25, 2018

This week in Brussels, Apple’s chief executive Tim Cook somewhat surprisingly castigated how personal data is handled by businesses and …

read more

Bank Discovers Customer Credit Card Numbers Traded Online

October 23, 2018

Payment card fraud costs banks and merchants nearly $23 billion a year and rising. As consumers spend more money online, …

read more

ShadowTalk Update – 10.22.2018

October 22, 2018

In this week’s ShadowTalk, following on from last week’s conversation on how managed service providers can increase your attack surface, …

read more

Cyber Security Awareness Month: Week 3 – Recognize Cyber Scams

October 19, 2018

This week we move onto theme three of Cyber Security Month: recognize cyber scams. The important point here is that …

read more

12.5 Million Email Archives Exposed: Lowering the Barriers for BEC

October 18, 2018

Digital Shadows’ latest research report, Pst! Cybercriminals on the Outlook for Your Emails, highlights the different ways cybercriminals can access corporate …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive