All Posts

Show
Don’t Just Read Intelligence: Learn From It
January 17, 2019 read more

Thedarkoverlord – losing his patients?

July 26, 2016

In late June 2016, we observed a spate of attacks allegedly conducted by a vendor named “thedarkoverlord” on the dark …

read more

Deer.io: Your One-Stop Shop for Cybercrime

July 26, 2016

Being a cyber criminal is becoming even easier as barriers to entry continue to be lowered. Digital Shadows’ research into …

read more

5 Takeaways From The “Building A Strategic Threat Intelligence Program” Webinar

July 26, 2016

Last week, the great Mike Rothman (of Securosis fame) and I did a webinar titled: “Building a Strategic Threat Intelligence …

read more

Tracking the Field: Eight cybersecurity considerations around Rio 2016

July 25, 2016

Last week, we saw reports of individuals arrested on charges of terrorism ahead of the upcoming games in Rio. This …

read more

PoodleCorp: in the business of kudos

July 22, 2016

PoodleCorp claimed to have successfully rendered the servers of the Android and iOS game Pokemon Go offline using several distributed …

read more

Towards a(nother) new model of attribution

July 21, 2016

Actor attribution is a common issue and activity within the world of cybersecurity. At its core, the actor attribution process …

read more

5 Key Lessons From The FDIC’s Breach Disclosure Debacle

July 18, 2016

Last week, the United States House Science, Space and Technology Committee released the scathing results of the committee’s investigations into …

read more

Open Source Intelligence versus Web Search: What’s The Difference?

July 11, 2016

“I can get that from Google!” – is a common phrase that has been directed at me during my time …

read more

Three Tactics Behind Cyber Extortion

July 11, 2016

As explained in a previous blog, extortion is not new – it’s now just been applied to the digital world …

read more

Modern crimeware campaigns – two bytes of the cherry

July 5, 2016

To a Columbian drug lord, the most valuable commodity is probably cocaine. To many financially motivated cybercriminals, the most valuable …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive