All Posts

Show
SearchLight’s Biggest Ever Update: New Ways to Discover, Contextualize, and Prioritize Digital Risks
July 23, 2019 read more

Smilex: Dangers of Poor OpSec

October 27, 2015

Background On 13 Oct 2015, it was revealed in an indictment on the US department of Justice website that Dridex …

read more

Online Carding

October 7, 2015

There is no shortage of credit card information being sold online. In the past six months alone, our spider (which covers I2P …

read more

How the Internet of Things (IoT) is Expanding Your Digital Shadow

September 9, 2015

The Internet of Things (IoT) is a development that is the direct result of objects, technology, people that have been …

read more

The Intelligence Cycle – What Is It Good For?

September 9, 2015

It seems that the concept of ‘intelligence’ is a problem. The definition isn’t agreed, and the industry is peppered with …

read more

OPSEC and Trust In An Underground Cybercriminal Forum

September 9, 2015

Introduction There are perhaps tens of thousands of forums and sites in the visible and dark webs dedicated to criminal …

read more

Digital Shadows Invited To 10 Downing Street

September 8, 2015

Interest in London’s burgeoning tech industry is growing so rapidly that even David Cameron has taken notice; at Pitch10, an event at 10 Downing Street to be held on Thursday 31st July, ten of the most promising digital companies in Britain will pitch their businesses to an audience that includes Cameron himself.

read more

Working In Multilingual Sources

September 8, 2015

This post will be about some of the challenges you are likely to face trying to handle data in different languages and how to deal with them. Most of our code is in Java so the examples here will all be written in Java

read more

The Intelligence Trinity

September 8, 2015

For several years now there has been considerable hype and hubris around the term ‘intelligence’ within the cyber security industry. It feels as if the term has been diluted as its usage has extended to include vendors dealing in a range of issues from bad IPs and Indicators of Compromise, to tip-offs that hacktivist groups are targeting particular sectors and the activities of APT groups, and everything in-between.

read more

Source Evaluation

September 8, 2015

To organisations, threat intelligence is about understanding the threat landscape – the various actors and campaigns which conduct cyber attacks – so that when they are specifically targeted it can be detected, mitigation put in place, and the risk to their business reduced. Robust source evaluation minimises the chance of crying wolf, or warning of the wrong threat entirely.

read more

Digital Shadows joins roundtable at 10 Downing Street

September 8, 2015

Alastair Paterson, CEO of Digital Shadows, recently visited 10 Downing Street to participate in a roundtable on cyber security. The session brought together leaders from industry, academia and government and sought to address the challenges surrounding cyber security policy.

read more