All Posts

Show
2.3 billion files exposed across online file storage technologies
May 30, 2019 read more

Digital Shadows Invited To 10 Downing Street

September 8, 2015

Interest in London’s burgeoning tech industry is growing so rapidly that even David Cameron has taken notice; at Pitch10, an event at 10 Downing Street to be held on Thursday 31st July, ten of the most promising digital companies in Britain will pitch their businesses to an audience that includes Cameron himself.

read more

Even The Hackers Are Targeted By Phishers

September 8, 2015

We noticed a Tweet from one of the groups we are tracking which claimed that the popular football game FIFA was “offline”. Given the unspecific nature of the Tweet and the lack of any evidence suggesting that the online services of the game had been affected by any kind of cyber attack, we assessed that it was likely a false claim.

read more

Working In Multilingual Sources

September 8, 2015

This post will be about some of the challenges you are likely to face trying to handle data in different languages and how to deal with them. Most of our code is in Java so the examples here will all be written in Java

read more

The Intelligence Trinity

September 8, 2015

For several years now there has been considerable hype and hubris around the term ‘intelligence’ within the cyber security industry. It feels as if the term has been diluted as its usage has extended to include vendors dealing in a range of issues from bad IPs and Indicators of Compromise, to tip-offs that hacktivist groups are targeting particular sectors and the activities of APT groups, and everything in-between.

read more

Source Evaluation

September 8, 2015

To organisations, threat intelligence is about understanding the threat landscape – the various actors and campaigns which conduct cyber attacks – so that when they are specifically targeted it can be detected, mitigation put in place, and the risk to their business reduced. Robust source evaluation minimises the chance of crying wolf, or warning of the wrong threat entirely.

read more

Digital Shadows joins roundtable at 10 Downing Street

September 8, 2015

Alastair Paterson, CEO of Digital Shadows, recently visited 10 Downing Street to participate in a roundtable on cyber security. The session brought together leaders from industry, academia and government and sought to address the challenges surrounding cyber security policy.

read more

Remote working at Digital Shadows

September 8, 2015

Here at Digital Shadows we’ve worked hard to assemble the most dedicated and talented development team possible and that has resulted in our team being concentrated here in London, but including members both further afield in the UK and internationally. This means that we’ve had to learn how to work with a distributed team and this post will cover our experiences and some of the utilities we’re making use of to work as efficiently as possible.

read more

Analytical Tradecraft at Digital Shadows

September 8, 2015

This week my colleague and I attended the SANS Cyber Threat Intelligence conference in Washington DC. It was great to hear more from analysts and CTI users from across the community, as well as mingle with the plethora of vendors who were present. This blog explores some of the themes which arose from discussions on analytical tradecraft.

read more

Digital Shadows Works Alongside Bank of England To Develop New Testing Framework To Help Guard UK Financial Sector Against Cyber Attack

September 8, 2015

CBEST aims to improve the understanding of the types of cyber-attack that could undermine financial stability in the UK, and …

read more

The Dangers of Groupthink

September 7, 2015

Over the next few blog posts we’ll be looking at various types of cognitive bias and suggest ways of dealing with them.

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive