All Posts

Show
Dark Web Monitoring: The Good, The Bad, and The Ugly
September 11, 2019 read more

Emotet Returns: How To Track Its Updates

August 26, 2019

What is Emotet? Emotet started life as a banking trojan in 2014; targeting financial information on victim computers. However, over …

read more

ShadowTalk Update – Texas Ransomware Outbreaks and Phishing Attacks Using Custom 404 pages

August 23, 2019

Charles Ragland (a brand new ShadowTalk-er!) and Christian Rencken join Harrison this week to discuss an outbreak of ransomware attacks …

read more

Breach! An Analysis of the Modern Digital Breach, with Cyber Defense Lab’s CEO, Bob Anderson

August 22, 2019

Just prior to the BlackHat & DEFCON, my colleague Rick Holland and I were fortunate to share some time in …

read more

The Nouns of Black Hat: People, Places, and Things From Summer Camp 2019

August 19, 2019

Black Hat and DEFCON are a wrap! Digital Shadows was there in a big way this year and it was …

read more

Black Hat and DEFCON 2019 – Some of our Favorite Sessions

August 19, 2019

The team were fortunate to go to Black Hat and DEFCON this year, and we wanted to share back some …

read more

ShadowTalk Update – Nightmare Market in Disarray and SEC Investigation into Data Leak at First American Financial Corp

August 16, 2019

Harrison is back! Alex and Christian join this week to discuss how Black Hat and DEFCON went last week, analyze …

read more

Fresh blow for dark web markets: Nightmare market in disarray

August 13, 2019

Over the past three weeks, Digital Shadows has observed another popular dark web criminal market – Nightmare – experience several …

read more

Recon Village: Panning for gold

August 1, 2019

Richard will be presenting ‘Asset Discovery: Making Sense of the Ocean of OSINT’ at 13.50 on 9th August 2019 in …

read more

Capital One Breach: What we know and what you can do

July 31, 2019

Monday blues. It’s a thing. It’s when you start the week feeling moody because your weekend is over. The feeling …

read more

The Account Takeover Kill Chain: A Five Step Analysis

July 30, 2019

It’s no secret that credential exposure is a growing problem. Take a look at Troy Hunt’s https://www.haveibeenpwned.com – a tool …

read more