ACH

Show

The Devil, the Details, and the Analysis of Competing Hypothesis

February 13, 2020

  Digital Shadows’ Photon Research Team recently released a comprehensive examination of the Analysis of Competing Hypothesis (ACH) method, in …

read more

ShadowTalk Update – 11.05.2018

November 5, 2018

In November 2016, Tesco Bank suffered a series of fraud attacks that allowed cybercriminals to check out with £2.26m (roughly …

read more

Security Analyst Spotlight Series: Rafael Amado

June 14, 2018

Organizations rely on Digital Shadows to be an extension of their security team. Our global team of analysts provide relevant …

read more

Digital Shadows’ Most Popular Blogs of 2017: Analysis of Competing Hypotheses For The Win

December 12, 2017

This time last year, we looked back at the blogs that caught our readers’ attention the most. In 2016, it …

read more

WannaCry: An Analysis of Competing Hypotheses – Part II

June 7, 2017

Following the furore of last month’s WannaCry ransomware attacks, Digital Shadows produced an Analysis of Competing Hypotheses (ACH) table to …

read more

WannaCry: An Analysis of Competing Hypotheses

May 18, 2017

On 12 May 2017, as the WannaCry ransomware spread across computer networks across the world, a variety of explanations also …

read more

Leak on Aisle 12! An Analysis of Competing Hypotheses for the Tesco Bank Incident

November 11, 2016

On November 6, 2016 multiple UK media outlets reported that the UK-based Tesco Bank had informed approximately 40,000 customers that …

read more