All Posts

Show
Detecting Exposed Company Data: The What, Why, and How
March 12, 2019 read more

How the Internet of Things (IoT) is Expanding Your Digital Shadow

September 9, 2015

The Internet of Things (IoT) is a development that is the direct result of objects, technology, people that have been …

read more

Raising the Stakes – U.S. Retaliation for Chinese Cyber Espionage Has the Potential for Escalation

September 9, 2015

Following the June 2015 announcement that the U.S. Office of Personnel Management (OPM) had been breached and the personal data …

read more

The Intelligence Cycle – What Is It Good For?

September 9, 2015

It seems that the concept of ‘intelligence’ is a problem. The definition isn’t agreed, and the industry is peppered with …

read more

OPSEC and Trust In An Underground Cybercriminal Forum

September 9, 2015

Introduction There are perhaps tens of thousands of forums and sites in the visible and dark webs dedicated to criminal …

read more

Watch Dogs – It’s Just A Game… Or Is It?

September 8, 2015

A new video game called Watch Dogs is offering an interesting take on real life digital shadows. Sounds like a pretty scary world – Watch Dogs’ website proclaims “You are not an individual. You are a data cluster.” But just how accurate is this idea in the world that we live in? At Digital Shadows we protect organisations from data loss and targeted cyber attack.

read more

Digital Shadows Invited To 10 Downing Street

September 8, 2015

Interest in London’s burgeoning tech industry is growing so rapidly that even David Cameron has taken notice; at Pitch10, an event at 10 Downing Street to be held on Thursday 31st July, ten of the most promising digital companies in Britain will pitch their businesses to an audience that includes Cameron himself.

read more

Even The Hackers Are Targeted By Phishers

September 8, 2015

We noticed a Tweet from one of the groups we are tracking which claimed that the popular football game FIFA was “offline”. Given the unspecific nature of the Tweet and the lack of any evidence suggesting that the online services of the game had been affected by any kind of cyber attack, we assessed that it was likely a false claim.

read more

Working In Multilingual Sources

September 8, 2015

This post will be about some of the challenges you are likely to face trying to handle data in different languages and how to deal with them. Most of our code is in Java so the examples here will all be written in Java

read more

The Intelligence Trinity

September 8, 2015

For several years now there has been considerable hype and hubris around the term ‘intelligence’ within the cyber security industry. It feels as if the term has been diluted as its usage has extended to include vendors dealing in a range of issues from bad IPs and Indicators of Compromise, to tip-offs that hacktivist groups are targeting particular sectors and the activities of APT groups, and everything in-between.

read more

Source Evaluation

September 8, 2015

To organisations, threat intelligence is about understanding the threat landscape – the various actors and campaigns which conduct cyber attacks – so that when they are specifically targeted it can be detected, mitigation put in place, and the risk to their business reduced. Robust source evaluation minimises the chance of crying wolf, or warning of the wrong threat entirely.

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive