photon research team

Show
Security Practitioner’s Guide to Email Spoofing and Risk Reduction
January 24, 2019

In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we …

read more

Easing into the extortion game

April 3, 2019

One of the main ideas which flowed through Photon’s most recent research report, A Tale of Epic Extortions, was that cyber …

read more

Predator: Modeling the attacker’s mindset

April 2, 2019

Author: Richard Gold  The phrases “attacker’s mindset” or “think like an attacker” are often used in cyber security to encourage …

read more

Photon Research Team Shines Light On Digital Risks

February 13, 2019

I’m very excited to announce the launch of the Digital Shadows’ Photon Research Team. We have decided to bolster our …

read more

TV License and Vehicle Tax Fraud: New Year, Same Old Scams

January 8, 2019

Over the last week we’ve been tracking several emails impersonating UK services such as “TV Licensing” and “Vehicle Road Tax”. …

read more

Cyber Threats to Watch in 2019: Key Takeaways from our webinar with the FBI Cyber Squad

December 20, 2018

As 2018 comes to a close, Digital Shadows partnered with the FBI’s Cyber Division for a webinar to discuss some …

read more

Bomb Threat Emails: Extortion Gets Physical

December 14, 2018

We’ve seen yet another change in tactics for the recent spate of extortion campaigns. Whereas before these emails tried to …

read more

Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

December 12, 2018

Overall, the infosec community has done a relatively good job in securing systems. While a measure of restrained back-patting is …

read more

2019 Cyber Security Forecasts: Six Things on the Horizon

December 5, 2018

The new year is upon us! 2018 brought us Spectre and Meltdown, Russian GRU indictments, and the exposure of 500 …

read more

Threat Actors Use of Cobalt Strike: Why Defense is Offense’s Child

November 29, 2018

I’m a big fan of the Cobalt Strike threat emulation software. Here at Digital Shadows, it’s a staple of our …

read more

Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework

November 27, 2018

Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it calls the “Essential 8”: a set …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive