Minimize your digital risk by detecting data loss, securing your online brand, and reducing your attack surface.
A powerful, easy-to-use search engine that combines structured technical data with content from the open, deep, and dark web.
Digital Risk Protection
Read our new practical guide to reducing digital risk.
Read Here
New report recognizes Digital Shadows for strongest current offering, strategy, and market presence of 14 vendors profiled
Read Full Report
The latest advice, opinion and research from our dedicated security analyst team.
Intelligence Tradecraft
The Importance of Learning in Cyber Security Those unfamiliar with the field of computer security, reading the news headlines about …
Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it calls the “Essential 8”: a set …
Cyber threat reporting sits at a dichotomy. On the one hand, much furor is made of the role of non-state …
Organizations rely on our cyber intelligence analysts to be an extension of their security team. Our global team of analysts …
A computer worm is a piece of malware that is designed to replicate itself in order to spread to other …
Twitter has become an extremely valuable tool for security researchers; experts including Kevin Beaumont and PwnAllTheThings frequently post research findings …
Many organizations are exquisitely aware that they are the target of a wide-range of cyber-attacks: from targeted intrusions to mere …
Last week we wrote about the disappearance of AlphaBay dark web marketplace and assessed three potential scenarios to look out …
The AlphaBay dark web marketplace has been inaccessible since 05 Jul 2017. With no substantive explanation from the site’s owners, …
What is Threat Led Penetration Testing? Threat led penetration testing is, in essence, using threat intelligence to emulate the tactics, …
Following the furore of last month’s WannaCry ransomware attacks, Digital Shadows produced an Analysis of Competing Hypotheses (ACH) table to …