Security Research

Show
Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It
December 12, 2018

Overall, the infosec community has done a relatively good job in securing systems. While a measure of restrained back-patting is …

read more

SamSam But Different: MITRE ATT&CK and the SamSam Group Indictment

February 26, 2019

In our latest research report, A Tale of Epic Extortions, the Digital Shadows Photon Research Team highlight how cybercriminals abuse our …

read more

Extortion Exposed: Sextortion, thedarkoverlord, and SamSam

February 21, 2019

In our most recent research, A Tale of Epic Extortions, the Digital Shadows Photon Research Team approached the topic of …

read more

SANS DFIR Cyber Threat Intelligence Summit 2019 – Extracting More Value from Your CTI Program

February 5, 2019

We were fortunate to attend the 2019 SANS DFIR Cyber Threat Intelligence Summit this year, which brings together some of …

read more

TV License and Vehicle Tax Fraud: New Year, Same Old Scams

January 8, 2019

Over the last week we’ve been tracking several emails impersonating UK services such as “TV Licensing” and “Vehicle Road Tax”. …

read more

Using Shadow Search to Power Investigations: Sextortion Campaigns

December 6, 2018

We recently wrote about sextortion campaigns and how they’ve developed their lures over time. As a result of these campaigns, …

read more

2019 Cyber Security Forecasts: Six Things on the Horizon

December 5, 2018

The new year is upon us! 2018 brought us Spectre and Meltdown, Russian GRU indictments, and the exposure of 500 …

read more

Digital Shadows Contributes to Insider Threat Research

August 9, 2018

On July 30, Forrester published its latest research report on malicious insiders, Defend Your Data As Insiders Monetize Their Access. …

read more

Cyber Threats to ERP Applications: Threat Landscape

July 24, 2018

What are ERP Applications? Organizations rely on Enterprise Resource Planning (ERP) applications to support business processes. This includes payroll, treasury, …

read more

How Cybercriminals are using Blockchain DNS: From the Market to the .Bazar

June 12, 2018

Since the takedowns of AlphaBay and Hansa in 2017, the cybercriminal community has been incorporating alternative technologies to improve both …

read more

Threats to the 2018 Football World Cup: Traditional Rules or a New Style of Play?

June 7, 2018

The tension and excitement that precedes all global sporting events is beginning to build towards the start of this year’s …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive