
What Attackers Want for Christmas
December 22, 2017 | 4 Min Read

OL1MP: A Telegram Bot Making Carding Made Easy This Holiday Season
December 21, 2017 | 3 Min Read

‘Tis The Season To Do Predictions – The 2018 Cybersecurity Landscape
December 18, 2017 | 3 Min Read

Why I Joined Digital Shadows: Product, Culture and Opportunity
December 13, 2017 | 2 Min Read

A New CISO Looking to See How Deep the Rabbit Hole Goes
December 12, 2017 | 2 Min Read

Digital Shadows’ Most Popular Blogs of 2017: Analysis of Competing Hypotheses For The Win
December 12, 2017 | 3 Min Read

Meet the New Digitalshadows.com
November 29, 2017 | 2 Min Read

Risks to Retail: Cybercriminals Sharing the Joy This Holiday Season
November 21, 2017 | 3 Min Read

GDPR – Not Just a European Concern
November 20, 2017 | 6 Min Read

Fake News is More Than a Political Battlecry
November 16, 2017 | 3 Min Read

Why “Have a Safe Trip” Is Taking On Greater Meaning
November 14, 2017 | 5 Min Read

Know Where to Find Your Digital Risk
November 10, 2017 | 4 Min Read

Pwnage to Catalonia: Five Things We Know About OpCatalunya
November 2, 2017 | 5 Min Read

ICS Security: Strawmen In the Power Station
October 31, 2017 | 5 Min Read

Extorters Going to Extort: This Time Other Criminals Are the Victims
October 26, 2017 | 3 Min Read

Women in Security: Where We Are And Where We Need To Go
October 25, 2017 | 7 Min Read

Trust vs Access: A Tale of Two Vulnerability Classes
October 20, 2017 | 5 Min Read

Key Reinstallation Attacks (KRACK): The Impact So Far
October 16, 2017 | 4 Min Read

Simply Put, Effective Cybersecurity is the Strength Sum of Its Parts
October 11, 2017 | 2 Min Read

Simple Steps to Online Safety
October 5, 2017 | 4 Min Read

Gearing Up For National Cyber Security Awareness Month
October 3, 2017 | 4 Min Read

2017 Equifax Breach: Impact and Lessons Learned
September 28, 2017 | 3 Min Read

Recognition of Hard Work and Relevance – It’s Time to Go Global
September 20, 2017 | 3 Min Read

Bringing Down the Wahl: Three Threats to the German Federal Election
September 14, 2017 | 7 Min Read

An Update on the Equifax Data Breach
September 13, 2017 | 8 Min Read

Equifax Breach: The Impact For Enterprises and Consumers
September 8, 2017 | 9 Min Read

Return of the Worm: A Red Hat Analysis
September 7, 2017 | 4 Min Read

Content Delivery Networks (CDNs) Can Leave You Exposed – How You Might be Affected and What You Can Do About It
September 6, 2017 | 5 Min Read

Bitglass: Compromised Credentials are Just One Way Your Corporate Data is Being Exposed
August 18, 2017 | 2 Min Read

Fluctuation in the Exploit Kit Market – Temporary Blip or Long-Term Trend?
August 16, 2017 | 5 Min Read

All That Twitterz Is Not Gold: Why You Need to Rely on Multiple Sources of Intelligence
August 9, 2017 | 3 Min Read

Cybercrime Finds a Way, the Limited Impact of AlphaBay and Hansa’s Demise
August 7, 2017 | 5 Min Read

Reading Your Texts For Fun and Profit – How Criminals Subvert SMS-Based MFA
August 1, 2017 | 4 Min Read

What is a Threat Model, and Why Organizations Should Care
July 31, 2017 | 4 Min Read

Fraudsters Scoring Big – an Inside Look at the Carding Ecosystem
July 18, 2017 | 3 Min Read

The Future of Marketplaces: Forecasting the Decentralized Model
July 17, 2017 | 4 Min Read

AlphaBay Disappears: 3 Scenarios to Look For Next
July 14, 2017 | 6 Min Read

Threat Led Penetration Testing – The Past, Present and Future
July 10, 2017 | 5 Min Read

Petya-Like Wormable Malware: The “Who” and the “Why”
June 30, 2017 | 7 Min Read

Keep Your Eyes on the Prize: Attack Vectors are Important But Don’t Ignore Attacker Goals
June 23, 2017 | 5 Min Read

Threats From the Dark Web
June 26, 2017 | 5 Min Read

WannaCry: An Analysis of Competing Hypotheses – Part II
June 7, 2017 | 7 Min Read

7 Tips for Protecting Against Account Takeovers
May 22, 2017 | 3 Min Read

WannaCry: An Analysis of Competing Hypotheses
May 18, 2017 | 6 Min Read

Digital Shadows’ 6th Anniversary
May 16, 2017 | 5 Min Read

5 Lessons from WannaCry: Preventing Attacks with Security Engineering
May 16, 2017 | 5 Min Read

WannaCry: The Early 2000s Called, They Want Their Worms Back
May 12, 2017 | 3 Min Read

Authentication Nation: 5 Ways NIST is Changing How We Think About Passwords
May 9, 2017 | 4 Min Read

The 3 Pillars of Digital Risk Management: Part 3 – The Top 5 Main Risks of Reputational Damage
April 27, 2017 | 2 Min Read

The Usual Suspects: Understanding the Nuances of Actors’ Motivations and Capabilities
April 21, 2017 | 3 Min Read

Liberté, égalité, securité: 4 Threats to the French Presidential Election
April 20, 2017 | 5 Min Read

The 3 Pillars of Digital Risk Management: Part 2 – The 6 Main Areas That Contribute to Data Leakage Risks
April 18, 2017 | 2 Min Read

The 3 Pillars of Digital Risk Management: Part 1 Understanding Cyber Threats
April 13, 2017 | 3 Min Read

All Sources Are Not the Same; Why Diversity Is Good for Intelligence
April 11, 2017 | 3 Min Read

Monitoring the Mobile Threat Landscape
April 4, 2017 | 4 Min Read

OpIsrael Hacktivists Targeted By Unknown Threat Actor
March 30, 2017 | 3 Min Read

Turk Hack Team and the “Netherlands Operation”
March 29, 2017 | 4 Min Read

Tax Fraud in 2017
March 27, 2017 | 4 Min Read

Dutch Elections – Looking Back at Cyber Activity
March 21, 2017 | 3 Min Read

Five Reasons Why Alex Seton VP of Business and Corporate Development, Joined Digital Shadows
March 21, 2017 | 3 Min Read

5 Risks Posed By Mobile Applications That SearchLight Helps You Manage
March 14, 2017 | 2 Min Read

Back to the red pencil – Cyber threats to the Dutch elections
March 13, 2017 | 5 Min Read

Learning from the Top Threats Financial Services Faced in 2016
March 8, 2017 | 2 Min Read

New “Blaze” exploit kit claims to exploit recent Cisco WebEx vulnerability
March 2, 2017 | 4 Min Read

Step by Step: The Changing Face of Threat Led Penetration Testing
February 28, 2017 | 4 Min Read

Sun to Set on BEPS/Sundown Exploit Kit?
February 22, 2017 | 4 Min Read

Four Things to Look Out for This Valentine’s Day
February 14, 2017 | 4 Min Read

An unusually Swift(tay) malware delivery tactic
February 9, 2017 | 5 Min Read

F3EAD: Find, Fix, Finish, Exploit, Analyze and Disseminate – The Alternative Intelligence Cycle
February 8, 2017 | 4 Min Read

How the Frenzy Unfolded: Analyzing Various Mongo Extortion Campaigns
February 7, 2017 | 4 Min Read

Ready for the Blitz: Assessing the Threats to Super Bowl LI
February 2, 2017 | 4 Min Read

Making Cents of ATM Malware Campaigns – Comparing and Contrasting Operational Methodologies
January 30, 2017 | 4 Min Read

Dial “M” for malware: Two-factor scamming
January 26, 2017 | 4 Min Read

Innovation in The Underworld: Reducing the Risk of Ripper Fraud
January 23, 2017 | 7 Min Read

Known Unknowns: Key Events to Keep Your Eyes Out for in 2017
January 19, 2017 | 3 Min Read

Two Ways to Effectively Tailor Your Intelligence Products
January 17, 2017 | 4 Min Read

All You Can Delete MongoDB Buffet
January 12, 2017 | 4 Min Read

10 Ways You Can Prepare for DDoS Attacks in 2017
January 11, 2017 | 1 Min Read

Trump and Intelligence: 6 Ways To Deal With Challenging Intelligence Consumers
January 4, 2017 | 4 Min Read