The latest advice, opinion and research from our dedicated intelligence analyst team.
All Posts
This week, Digital Shadows will turn five years old. Over this time, our product and engineering teams have continually worked …
Last week Verizon released the 2016 Data Breach Investigations Report. If you haven’t read it yet, I highly recommend that …
Tactical feeds have dominated the threat intelligence narrative for many years, but there is an emerging understanding that there must …
Artificial Intelligence (AI) is currently going through one of its regular hype bubbles. Another dawn of the super-intelligent machine is …
On 17 April 2016, two posts were added to Pastebin (one in Spanish, the other in English) detailing the alleged …
Last month our intelligence team published a blog on the use of ABI in understanding OpIsrael 2016, which suggested that …
Call me phishmail. Whaling – also known as CEO fraud and business email compromise (BEC) – is a type of …
For many people, the term “dark web” refers to criminal activity on Internet. There are many definitions for what comprises …
The headlines resulting from the Target/Fazio Mechanical Services and T-Mobile/Experian breaches have raised the awareness around third-party risks. Unfortunately, awareness …
On the March 15, I was lucky enough to be invited to a round table event at Chatham House in …