Category: Brand Protection

Brand Protection

Social Media Monitoring Best Practices

September 1, 2021 | 3 Min Read

This blog is drawn from the Digital Shadows’ Social Media Monitoring Solutions Guide, which provides best practices for security teams who want to derive value from social media...
Social Media Monitoring Best Practices

Social Media Monitoring Best Practices

September 1, 2021 | 3 Min Read

This blog is drawn from the Digital Shadows’ Social Media Monitoring Solutions Guide, which provides best practices for security teams...
The Phight Against Phishing

The Phight Against Phishing

August 17, 2021 | 17 Min Read

What is Phish(ing)? No, not the band, unless you’re really into jam bands. We’re talking about the email attack variety....
Getting Started With Domain Monitoring Part 3: Remediation

Getting Started With Domain Monitoring Part 3: Remediation

July 27, 2021 | 5 Min Read

This blog is taken from our recent Domain Monitoring Solutions Guide, which provides best practices and free tools to begin...
Why Domains Matter: Impersonations and Your Brand

Why Domains Matter: Impersonations and Your Brand

July 13, 2021 | 9 Min Read

Recently, we’ve released a few articles on typosquatting, Getting Started with Domain Monitoring Part I, and Part II and a...
Getting Started with Domain Monitoring Part 2: Detection

Getting Started with Domain Monitoring Part 2: Detection

July 7, 2021 | 4 Min Read

This blog is taken from our recent Domain Monitoring Solutions Guide, which provides best practices and free tools to begin...
Getting Started with Domain Monitoring: Part 1, Collection

Getting Started with Domain Monitoring: Part 1, Collection

June 30, 2021 | 4 Min Read

This blog is taken from our recent Domain Monitoring Solutions Guide, which provides best practices and free tools to begin...
Tax and Unemployment Fraud in 2021

Tax and Unemployment Fraud in 2021

March 24, 2021 | 6 Min Read

It’s the most wonderful time of the year! Tax season again. In a decision to assist US taxpayers navigating the...
Threat Intelligence Can Be Noisy: SearchLight Helps

Threat Intelligence Can Be Noisy: SearchLight Helps

February 16, 2021 | 6 Min Read

Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence...
Emotet Disruption: what it means for the cyber threat landscape

Emotet Disruption: what it means for the cyber threat landscape

February 3, 2021 | 8 Min Read

Last week, the European Union Agency for Law Enforcement Cooperation (EUROPOL) published a press release detailing the operation that led...
DarkMarket’s seizure: the decline of the marketplace?

DarkMarket’s seizure: the decline of the marketplace?

February 2, 2021 | 6 Min Read

Once upon a time, a high-profile dark web marketplace seizure or exit scam would have been big news in the...
Joker’s Stash’s Final Deal: A turning point for AVCs?

Joker’s Stash’s Final Deal: A turning point for AVCs?

January 28, 2021 | 12 Min Read

Back in December 2020, Digital Shadows reported that the Blockchain DNS domains for the infamous carding automated vending cart (AVC)...
Brexit 2021: implications for the security landscape

Brexit 2021: implications for the security landscape

January 27, 2021 | 8 Min Read

Ok I’ll admit it, I feel pretty sorry for Boris Johnson. That doesn’t appear to be a particularly common consensus...
Ransomware: Analyzing the data from 2020

Ransomware: Analyzing the data from 2020

January 26, 2021 | 7 Min Read

Note: This blog is a roundup of our quarterly ransomware series. You can also see our Q2 Ransomware Trends, Q3...
Azure AD: Auto Validate Exposed Credentials

Azure AD: Auto Validate Exposed Credentials

January 19, 2021 | 3 Min Read

SearchLight customers can now automatically validate credential alerts via an integration with Azure AD, drastically reducing the time required to...
Tracing the Rise and Fall of Dark Web Marketplaces and Cybercriminal Forums

Tracing the Rise and Fall of Dark Web Marketplaces and Cybercriminal Forums

January 13, 2021 | 9 Min Read

It’s often the case that a sequel to a great book or a remake of a once-popular TV series doesn’t...
ICYMI: SolarWinds Compromise Update

ICYMI: SolarWinds Compromise Update

January 8, 2021 | 7 Min Read

Note: This blog is a follow-up of our previous SolarWinds blog by our in-house threat intelligence team. You can read...
Looking back at 2020: A Year in Review

Looking back at 2020: A Year in Review

January 6, 2021 | 8 Min Read

2020 is truly an extraordinary year (and some aspects worse than others). This year was also made up of some...