Our Latest Digital Risk Protection Resources, Tips, and Best Practices
Browse our digital risk protection and threat intelligence resources center to learn how to protect your business against risks on the open, deep, and dark web.
-
Initial Access Brokers Report
Initial access brokers are benefitting from a rise in adoption of remote access software. This Initial Access Brokers Report analyzes this phenomenon and what it means for security practitioners.
-
Resources for Your Team during the Coronavirus Pandemic
Take Me There -
Exposed Credentials Solutions Guide
Get Your Copy -
Initial Access Brokers: A Deep Dive
Watch Here
On-demand Webinar -
Weekly: When Initial Access Brokers Attack
ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence.
-
"Hands Down The Best Product Of Its Class, And A First Class Company"
See Gartner Review -
Weekly Intelligence Summary 26 February
The People’s Republic of China-linked advanced persistent threat group “APT31” reportedly cloned and deployed a zero-day exploit developed by NSA's Equation Group in 2013.
-
Weekly: Egregor Arrests, SIM-Swapping, and Oldsmar Updates!
ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence.
-
Check out our Weekly Intelligence Summary
Access Here -
Weekly Intelligence Summary 19 February
An unidentified attacker accessed the computer systems of a water treatment facility in the US, altering sodium hydroxide levels in the potable water supply.
-
Exposed Credentials Solutions Guide
This guide draws from best practices suggested in SearchLight’s playbooks, so security professionals can improve their tools and processes to prevent employee account takeover.
-
Want To Try Our Digital Risk Protection Tool?
Get Started Free -
Weekly: Ransomware Updates - CDPR Victimized, Ziggy’s End, and the Oldsmar Water Incident
ShadowTalk hosts Alec, Ivan, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence.
-
Heard our ShadowTalk Threat Intelligence Podcast?
Subscribe Here! -
Weekly Intelligence Summary 12 February
Following the disclosure of the SolarWinds supply-chain compromise in December 2020, details continue to emerge about the scale of the attack.
-
Weekly: Lebanese Cedar, Nefilim Ghost Credentials, and More on SolarWinds and Emotet
ShadowTalk hosts Stefano, Adam, and Kim bring you the latest in threat intelligence.
-
Weekly Intelligence Summary 05 February
The North Korean advanced persistent threat (APT) group “ZINC” has been targeting cyber-security professionals with social engineering that leads to malware delivery.
-
6 Considerations When Purchasing Threat Intelligence
When selecting the optimal Cyber Threat Intelligence solution for your organization, use this guide to assess threat intelligence providers across 6 critical categories.
-
Weekly: Law Enforcement Wins the Week - The Fall of NetWalker and Emotet!
ShadowTalk hosts Alec, Charles, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence.
-
Weekly Intelligence Summary 29 January
A new web portal is aiding cyber-threat incident responders by detailing vulnerabilities in popular malware.
-
Weekly: CISA Security Advisory, IObit Attack, and more SolarWinds!
ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence.
-
31:28
2021 Cybersecurity Forecasts: Trends and Predictions For the New Year
In this session, Digital Shadows will share their insights and assessments into what we can expect to see in 2021.
-
Holiday Cybercrime: Krampus is in Town
In this blog, we explore how cybercriminals are taking advantage of not-so-cheery sales this holiday season. From carding methods to account sales, nothing is off-limits.
-
Digital Shadows’ Top Five Blogs of 2020
We are here to go through the top five blogs of 2020—one for each quarter plus a bonus one to quickly recap why they (still) matter and be better prepared for the exciting new year in security.
-
Impersonator Syndrome: Supply chain lures and COVID-19 cures
While we’ve reported on recent Q3 ransomware campaigns targeting the healthcare industry, a new campaign targeting COVID-19 vaccine supply chain partners has emerged.
-
How Cybercriminals Answer “What do you do for a living?”
Have you ever wondered how cybercriminals explain their mysterious means of income to others? While not all threat actors’ illicit ...
-
THE TOP 3 CYBERSECURITY THREATS IN THE MIDDLE EAST
Rising rates of cybercriminal activities occur as threat actors observe the flourishing economies in the Middle East.
-
Loading More...