Intelligence Tradecraft

Show
Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework
November 27, 2018

Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it calls the “Essential 8”: a set …

read more

Non-traditional State Actors: New Kids on the Block

September 18, 2018

Cyber threat reporting sits at a dichotomy. On the one hand, much furor is made of the role of non-state …

read more

Security Analyst Spotlight Series: Rose Bernard

May 23, 2018

Organizations rely on our cyber intelligence analysts to be an extension of their security team. Our global team of analysts …

read more

Return of the Worm: A Red Hat Analysis

September 7, 2017

A computer worm is a piece of malware that is designed to replicate itself in order to spread to other …

read more

All That Twitterz Is Not Gold: Why You Need to Rely on Multiple Sources of Intelligence

August 9, 2017

Twitter has become an extremely valuable tool for security researchers; experts including Kevin Beaumont and PwnAllTheThings frequently post research findings …

read more

What is a Threat Model, and Why Organizations Should Care

July 31, 2017

Many organizations are exquisitely aware that they are the target of a wide-range of cyber-attacks: from targeted intrusions to mere …

read more

The Future of Marketplaces: Forecasting the Decentralized Model

July 17, 2017

Last week we wrote about the disappearance of AlphaBay dark web marketplace and assessed three potential scenarios to look out …

read more

AlphaBay Disappears: 3 Scenarios to Look For Next

July 14, 2017

The AlphaBay dark web marketplace has been inaccessible since 05 Jul 2017. With no substantive explanation from the site’s owners, …

read more

Threat Led Penetration Testing – The Past, Present and Future

July 10, 2017

What is Threat Led Penetration Testing? Threat led penetration testing is, in essence, using threat intelligence to emulate the tactics, …

read more

WannaCry: An Analysis of Competing Hypotheses – Part II

June 7, 2017

Following the furore of last month’s WannaCry ransomware attacks, Digital Shadows produced an Analysis of Competing Hypotheses (ACH) table to …

read more

WannaCry: An Analysis of Competing Hypotheses

May 18, 2017

On 12 May 2017, as the WannaCry ransomware spread across computer networks across the world, a variety of explanations also …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive