Category: Product

Product

Account takeover: Are you opening the door for cyber threat actors?

May 25, 2022 | 6 Min Read

In 2020, our research report on account takeover (ATO) highlighted the risk of using credentials in an unsafe manner, which was being exploited by cyber threat actors to great effect. In the coming...
Account takeover: Are you opening the door for cyber threat actors?

Account takeover: Are you opening the door for cyber threat actors?

May 25, 2022 | 6 Min Read

In 2020, our research report on account takeover (ATO) highlighted the risk of using credentials in an unsafe manner, which...
What we’re reading this month: May 2022

What we’re reading this month: May 2022

May 18, 2022 | 7 Min Read

Where is the year going? It only seems like yesterday that we celebrated the turn of the year, with the...
Automate Alert Investigation and Response with XSOAR and SearchLight

Automate Alert Investigation and Response with XSOAR and SearchLight

February 11, 2022 | 3 Min Read

We are excited to announce an expanded set of XSOAR playbooks that make use of Digital Shadows intelligence. In this...