Threat Intelligence Tradecraft

Iranian Cyber Threats: Practical Advice for Security Professionals
January 6, 2020

Unless you went very dark for an extended holiday break, you are no doubt very well aware of the United …

read more

What is a Threat Model, and Why Organizations Should Care

July 31, 2017

Many organizations are exquisitely aware that they are the target of a wide-range of cyber-attacks: from targeted intrusions to mere …

read more

The Future of Marketplaces: Forecasting the Decentralized Model

July 17, 2017

Last week we wrote about the disappearance of AlphaBay dark web marketplace and assessed three potential scenarios to look out …

read more

AlphaBay Disappears: 3 Scenarios to Look For Next

July 14, 2017

The AlphaBay dark web marketplace has been inaccessible since 05 Jul 2017. With no substantive explanation from the site’s owners, …

read more

Threat Led Penetration Testing – The Past, Present and Future

July 10, 2017

What is Threat Led Penetration Testing? Threat led penetration testing is, in essence, using threat intelligence to emulate the tactics, …

read more

Keep Your Eyes on the Prize: Attack Vectors are Important But Don’t Ignore Attacker Goals

June 23, 2017

Reporting on intrusions or attacks often dwells on the method that the attackers used to breach the defenses of a …

read more

WannaCry: An Analysis of Competing Hypotheses – Part II

June 7, 2017

Following the furore of last month’s WannaCry ransomware attacks, Digital Shadows produced an Analysis of Competing Hypotheses (ACH) table to …

read more

WannaCry: An Analysis of Competing Hypotheses

May 18, 2017

On 12 May 2017, as the WannaCry ransomware spread across computer networks across the world, a variety of explanations also …

read more

Authentication Nation: 5 Ways NIST is Changing How We Think About Passwords

May 9, 2017

Passwords have taken a beating over the past several years, and there seems to be little question among leading practitioners …

read more

All Sources Are Not the Same; Why Diversity Is Good for Intelligence

April 11, 2017

As we all know, if you listen to just one side of the story, very often you don’t get the …

read more

Step by Step: The Changing Face of Threat Led Penetration Testing

February 28, 2017

Organizations are increasingly adopting the threat led approach to penetration testing. This approach essentially advances the boundaries of conventional penetration …

read more