The Facebook Data Leak Explained2021

The Facebook Data Leak Explained

April 8, 2021 | 8 Min Read

This weekend press exposed a significant data leakage containing the records of 533 million Facebook users. The records were posted on multiple cybercriminal forums for free. This incident exposed...

Access Our Threat Intel In Test Drive

Test Drive SearchLight Free for 7 Days
Try It Now

Connect with us

The Facebook Data Leak Explained

The Facebook Data Leak Explained

April 8, 2021 | 8 Min Read

This weekend press exposed a significant data leakage containing the records of 533 million Facebook users. The records were posted...
Applying MITRE ATT&CK to your CTI Program

Applying MITRE ATT&CK to your CTI Program

April 7, 2021 | 5 Min Read

In recent years, there’s been an industry-wide movement to look more externally to predict, prevent, and adapt to threats. This...
New Release: Actionable Threat Intelligence with SearchLight

New Release: Actionable Threat Intelligence with SearchLight

April 6, 2021 | 3 Min Read

This year interest in cyber threat intelligence has risen to an all-time high. High profile events such as the Solarwinds...
The Microsoft Exchange Server Exploit: What Happened Next

The Microsoft Exchange Server Exploit: What Happened Next

April 1, 2021 | 9 Min Read

It may be April Fool’s Day, but zero-day exploits detected in Microsoft Exchange Servers are no joke. It’s now been...
3 Reasons to Download our New Cyber Threat Intelligence Solutions Guide

3 Reasons to Download our New Cyber Threat Intelligence Solutions Guide

March 30, 2021 | 3 Min Read

This blog outlines what you can expect to read in our newly-released Cyber Threat Intelligence: Solutions Guide and Best Practices....
Top Blogs of Q1 2021

Top Blogs of Q1 2021

March 30, 2021 | 10 Min Read

It’s safe to say that the first quarter of 2021 gave strong 2020 vibes. As many places are starting to...
Tax and Unemployment Fraud in 2021

Tax and Unemployment Fraud in 2021

March 24, 2021 | 6 Min Read

It’s the most wonderful time of the year! Tax season again. In a decision to assist US taxpayers navigating the...
Arrest, Prosecution, and Incarceration:  The Cybercriminal Perspective

Arrest, Prosecution, and Incarceration: The Cybercriminal Perspective

March 22, 2021 | 10 Min Read

As we highlighted in our recent blog on Cybercriminal Law Enforcement Crackdowns in 2021, this year has been a busy...
FBI IC3 2020: Cybercrime Causes $4.1 Billion in Losses

FBI IC3 2020: Cybercrime Causes $4.1 Billion in Losses

March 18, 2021 | 7 Min Read

On March 17th, the Federal Bureau of Investigation (FBI) published its 2020 Internet Crimes Complaint Center (IC3) report. This report...
Monitoring for Risks Coming From Suppliers: How SearchLight Helps

Monitoring for Risks Coming From Suppliers: How SearchLight Helps

March 18, 2021 | 4 Min Read

For those looking to monitor risks from third parties, it’s been a stressful few months. Back in December, FireEye released...
Smeltdown 2.0: Revisiting the Spectre and Meltdown Vulnerabilities

Smeltdown 2.0: Revisiting the Spectre and Meltdown Vulnerabilities

March 16, 2021 | 8 Min Read

Note: This blog is a revisit on our 2018 coverage of the Spectre and Meltdown vulnerabilities. You can read further...
Mapping MITRE ATT&CK to the Microsoft Exchange Zero-Day Exploits

Mapping MITRE ATT&CK to the Microsoft Exchange Zero-Day Exploits

March 11, 2021 | 7 Min Read

Note: This blog is a part of our MITRE ATT&CK Mapping series in which we map the latest major threat...
Year in Review: COVID-19 Concerns for Cybersecurity

Year in Review: COVID-19 Concerns for Cybersecurity

March 10, 2021 | 7 Min Read

Note: This blog is a follow-up on our remote worker series on navigating security as organizations continue to work from...
Mapping MITRE ATT&CK to the DPRK Financial Crime Indictment

Mapping MITRE ATT&CK to the DPRK Financial Crime Indictment

March 9, 2021 | 8 Min Read

Note: This blog is a part of our MITRE ATT&CK Mapping series in which we map the latest major threat...
The Right to Be Forgotten: Cybercriminal Forum Account Deletion

The Right to Be Forgotten: Cybercriminal Forum Account Deletion

March 4, 2021 | 9 Min Read

We often hear lines like “your past will always catch up with you, no matter how hard you try to...
Cybercriminal Law Enforcement Crackdowns in 2021

Cybercriminal Law Enforcement Crackdowns in 2021

March 2, 2021 | 9 Min Read

Note: This piece is a follow-up on our previous blog, Emotet Disruption: What it Means for the Cyber Threat Landscape,...
No Time for Threat Intel Noise

No Time for Threat Intel Noise

March 1, 2021 | 5 Min Read

I recently hit my fifth anniversary here at Digital Shadows. I’ve been reflecting on how the threat intelligence market has...
How to Monitor Initial Access Broker Listings in SearchLight

How to Monitor Initial Access Broker Listings in SearchLight

February 25, 2021 | 4 Min Read

By now, you might have caught wind of Photon’s new research on Initial Access Brokers (IABs). It’s a pretty awesome,...
Mapping MITRE ATT&CK to Compromised RDP Sales

Mapping MITRE ATT&CK to Compromised RDP Sales

February 23, 2021 | 8 Min Read

Digital Shadows recently published a free research paper titled Initial Access Brokers: An Excess of Access, outlining the emergence of...
The Rise of Initial Access Brokers

The Rise of Initial Access Brokers

February 22, 2021 | 5 Min Read

Over the course of 2020, Digital Shadows detected over 500 cybercriminals’ listings advertising network access across a multitude of industry...
5 Ways to Take Action on Threat Intelligence

5 Ways to Take Action on Threat Intelligence

February 18, 2021 | 5 Min Read

The Gartner definition of threat intelligence is “…evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing...
Threat Intelligence Can Be Noisy: SearchLight Helps

Threat Intelligence Can Be Noisy: SearchLight Helps

February 16, 2021 | 6 Min Read

Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence...
Cybercrime and Valentine’s Day: What to Look Out For

Cybercrime and Valentine’s Day: What to Look Out For

February 10, 2021 | 8 Min Read

Valentine’s Day is fast approaching and for many people that means one thing: going to the app store of their...
Prevent Account Takeover with Our New Exposed Credentials Solutions Guide

Prevent Account Takeover with Our New Exposed Credentials Solutions Guide

February 9, 2021 | 5 Min Read

Note: This blog is taken from our recently published Exposed Credentials Solutions Guide, which includes a complete list of our...
Emotet Disruption: what it means for the cyber threat landscape

Emotet Disruption: what it means for the cyber threat landscape

February 3, 2021 | 8 Min Read

Last week, the European Union Agency for Law Enforcement Cooperation (EUROPOL) published a press release detailing the operation that led...
DarkMarket’s seizure: the decline of the marketplace?

DarkMarket’s seizure: the decline of the marketplace?

February 2, 2021 | 6 Min Read

Once upon a time, a high-profile dark web marketplace seizure or exit scam would have been big news in the...
Joker’s Stash’s Final Deal: A turning point for AVCs?

Joker’s Stash’s Final Deal: A turning point for AVCs?

January 28, 2021 | 12 Min Read

Back in December 2020, Digital Shadows reported that the Blockchain DNS domains for the infamous carding automated vending cart (AVC)...
Brexit 2021: implications for the security landscape

Brexit 2021: implications for the security landscape

January 27, 2021 | 8 Min Read

Ok I’ll admit it, I feel pretty sorry for Boris Johnson. That doesn’t appear to be a particularly common consensus...
Ransomware: Analyzing the data from 2020

Ransomware: Analyzing the data from 2020

January 26, 2021 | 7 Min Read

Note: This blog is a roundup of our quarterly ransomware series. You can also see our Q2 Ransomware Trends, Q3...
ShadowTalk Update: CISA Security Advisory, IObit Attack, and more SolarWinds!

ShadowTalk Update: CISA Security Advisory, IObit Attack, and more SolarWinds!

January 25, 2021 | 2 Min Read

ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence. This week they cover: Adam and...
Threats to Asset and Wealth Management in 2020-2021

Threats to Asset and Wealth Management in 2020-2021

January 21, 2021 | 10 Min Read

Note: Our findings in this blog stem from analysis of all Q4 2020 cyber threat activity by our in-house research...
Our Top 3 Takeaways from Forrester: Now Tech: External Threat Intelligence Services, Q4 2020

Our Top 3 Takeaways from Forrester: Now Tech: External Threat Intelligence Services, Q4 2020

January 20, 2021 | 4 Min Read

When it comes to selecting an external threat intelligence tool or managed service, “plenty of fish in the sea” is...
Azure AD: Auto Validate Exposed Credentials

Azure AD: Auto Validate Exposed Credentials

January 19, 2021 | 3 Min Read

SearchLight customers can now automatically validate credential alerts via an integration with Azure AD, drastically reducing the time required to...
ShadowTalk Update: Sunburst, Sunspot, and more on SolarWinds!

ShadowTalk Update: Sunburst, Sunspot, and more on SolarWinds!

January 18, 2021 | 3 Min Read

ShadowTalk hosts Alec, Charles, Austin, and Ivan bring you the latest in threat intelligence. This week they cover: Significant updates...
Targets and Predictions for the COVID-19 Threat Landscape

Targets and Predictions for the COVID-19 Threat Landscape

January 14, 2021 | 7 Min Read

Note: This blog is part of our ongoing coverage of the virus’s impact on the cyber threat intelligence landscape. You...
Tracing the Rise and Fall of Dark Web Marketplaces and Cybercriminal Forums

Tracing the Rise and Fall of Dark Web Marketplaces and Cybercriminal Forums

January 13, 2021 | 9 Min Read

It’s often the case that a sequel to a great book or a remake of a once-popular TV series doesn’t...
ShadowTalk Update: SolarWinds Updates, TicketMaster Fraud, Apex Cyber Attack, and More!

ShadowTalk Update: SolarWinds Updates, TicketMaster Fraud, Apex Cyber Attack, and More!

January 11, 2021 | 2 Min Read

ShadowTalk hosts Stefano, Adam and Dylan bring you the latest in threat intelligence. This week they cover: Post-holiday updates on...
ICYMI: SolarWinds Compromise Update

ICYMI: SolarWinds Compromise Update

January 8, 2021 | 7 Min Read

Note: This blog is a follow-up of our previous SolarWinds blog by our in-house threat intelligence team. You can read...
Looking back at 2020: A Year in Review

Looking back at 2020: A Year in Review

January 6, 2021 | 8 Min Read

2020 is truly an extraordinary year (and some aspects worse than others). This year was also made up of some...