Category: General Cyber security

General Cyber security

What We’re Reading This Month

September 8, 2021 | 6 Min Read

Another busy month goes by, but the team has found some time to read around our threat intelligence-focused roles. This month’s installment looks at some more politically-driven analysis on...
What We’re Reading This Month

What We’re Reading This Month

September 8, 2021 | 6 Min Read

Another busy month goes by, but the team has found some time to read around our threat intelligence-focused roles. This...
Preventing Ransomware: Preventing the 300 at Thermopylae

Preventing Ransomware: Preventing the 300 at Thermopylae

September 2, 2021 | 7 Min Read

Ransomware, Ransomware, Ransomware Unless you’ve been on a quiet sabbatical or otherwise offline and not watching the news for the...
The Phight Against Phishing

The Phight Against Phishing

August 17, 2021 | 17 Min Read

What is Phish(ing)? No, not the band, unless you’re really into jam bands. We’re talking about the email attack variety....
The (Nation) State of APTs in 2021

The (Nation) State of APTs in 2021

August 12, 2021 | 10 Min Read

Even though it seems like every year has been the year of ransomware since probably 2017, this year is in...
Understanding Smishing Attacks

Understanding Smishing Attacks

August 10, 2021 | 5 Min Read

I’ve got some good news and some bad news.  The bad news is that I’ve been receiving a lot of...
Q2 Ransomware Roll Up

Q2 Ransomware Roll Up

July 20, 2021 | 9 Min Read

With the closing of another quarter, it’s once again time to have a look back at the cyber threat landscape...
Kaseya Attack Update: What’s Happened Since?

Kaseya Attack Update: What’s Happened Since?

July 14, 2021 | 6 Min Read

A little over a week ago, we wrote a bit about what we knew about the Ransomware-as-a-Service (RaaS) operator group...
Typosquatting Protection 101

Typosquatting Protection 101

July 1, 2021 | 6 Min Read

What is typosquatting? Typosquatting, also known as domain squatting or URL hijacking, is a type of malicious domain-impersonation attack where...
What We’re Reading This Month

What We’re Reading This Month

June 29, 2021 | 6 Min Read

Ransomware, ransomware, RANSOMWARE! We can’t get away from it. Certainly there’s a fear that focusing too much on one threat...
Threat Actors Living Off the Land

Threat Actors Living Off the Land

June 23, 2021 | 10 Min Read

Don’t underestimate your adversary—there are some security practitioners out there who might dismiss your everyday hackers and threat actors as...
Let’s Talk About Intel Requirements

Let’s Talk About Intel Requirements

June 17, 2021 | 7 Min Read

At Digital Shadows we get excited about intelligence. In fact, we’ve talked about it more than once before. One of...
The Business of Extortion: How Ransomware Makes Money

The Business of Extortion: How Ransomware Makes Money

June 9, 2021 | 8 Min Read

We can’t stop talking about it: Ransomware. It’s dominating a lot of security news for sure, which also means it’s...
Cryptocurrency Attacks to be Aware of in 2021

Cryptocurrency Attacks to be Aware of in 2021

June 8, 2021 | 10 Min Read

It’s been a pretty big year so far for cryptocurrency. After it reached an all-time high in April 2021, new...
What We’re Reading This Month

What We’re Reading This Month

May 26, 2021 | 6 Min Read

As intelligence analysts, our day-to-day is looking at lots of different information and discovering trends or different viewpoints. The research...
How Cybercriminals Can Leverage Your Vaccination Card Selfie

How Cybercriminals Can Leverage Your Vaccination Card Selfie

May 13, 2021 | 6 Min Read

Gotta do it for the ‘Gram (Instagram), as the kids might say. After a year in quarantine, you just got...