Our Latest Digital Risk Protection Resources, Tips, and Best Practices

Browse our digital risk protection and threat intelligence resources center to learn how to protect your business against risks on the open, deep, and dark web.

  • Cyber Threat Intelligence Solutions Guide

    Cyber Threat Intelligence Solutions Guide

    This guide outlines best practices for cyber threat intelligence and features resources to leverage when developing or improving your organization's cyber threat intelligence capabilities.

    Read Report
  • Weekly: Facebook Data Breach, Ransomware Cartel, and More!

    Weekly: Facebook Data Breach, Ransomware Cartel, and More!

    ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

    Read Post
  • Want To Try Our Digital Risk Protection Tool?

    Get Started Free
  • Weekly Intelligence Summary 09 April

    Weekly Intelligence Summary 09 April

    A user of the cybercriminal forum RaidForums has offered 533 million records of Facebook user data for only a few US dollars.

    Read Report
  • Initial Access Brokers: A Deep Dive

    On-demand Webinar

    Watch Here
  • Weekly: It’s A Ransomware Round-Up - CNA , Clop, and Much More!

    Weekly: It’s A Ransomware Round-Up - CNA , Clop, and Much More!

    ShadowTalk hosts Stefano, Dylan, Kim, and Chris bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 02 April

    Weekly Intelligence Summary 02 April

    Insurance provider CNA Financial has announced it was targeted in a cyber attack, later confirmed as involving the newly identified “Phoenix Cryptolocker” ransomware.

    Read Report
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • Initial Access Brokers Report

    Initial Access Brokers Report

    Initial access brokers are benefitting from a rise in adoption of remote access software. This Initial Access Brokers Report analyzes this phenomenon and what it means for security practitioners.

    Read Report
  • Exposed Credentials Solutions Guide

    Get Your Copy
  • Weekly: More on Microsoft and Acer Receives $50 Million in Ransom Demands

    Weekly: More on Microsoft and Acer Receives $50 Million in Ransom Demands

    ShadowTalk hosts Alec, Austin, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 26 March

    Weekly Intelligence Summary 26 March

    The new Internet of Things (IoT) botnet ZHtrap has been turning devices it has infected into honeypots, in a novel technique that highlights yet another risk presented by exposed IoT devices.

    Read Report
  • Weekly: Ransomware Resurgence - The Return of FIN8, DarkSide, and More!

    Weekly: Ransomware Resurgence - The Return of FIN8, DarkSide, and More!

    ShadowTalk hosts Stefano, Adam, Kim, and first-timer Chris bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 19 March

    Weekly Intelligence Summary 19 March

    Four zero-day vulnerabilities in Microsoft Exchange Servers have been linked to more than 30,000 cyber attacks taking place in the week following their discovery.

    Read Report
  • Threat Intelligence Can Be Noisy: SearchLight Helps

    Threat Intelligence Can Be Noisy: SearchLight Helps

    Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence ...

    Read Post
  • Weekly: Supply Chain Compromise Round-Up - Microsoft, Verkada, and More!

    Weekly: Supply Chain Compromise Round-Up - Microsoft, Verkada, and More!

    ShadowTalk hosts Alec, Ivan, Charles, and Austin bring you the latest in threat intelligence. This week they cover: - The team discuss HAFNIUM and Microsoft Servers Exchange - Updates on the...

    Read Post
  • Resources for Your Team during the Coronavirus Pandemic

    Take Me There
  • Weekly Intelligence Summary 12 March

    Weekly Intelligence Summary 12 March

    A new round of software attacks has raised another red flag concerning supply-chain security and the prevalence of third-party supply-chain targeting.

    Read Report
  • Weekly: When Initial Access Brokers Attack

    Weekly: When Initial Access Brokers Attack

    ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 26 February

    Weekly Intelligence Summary 26 February

    The People’s Republic of China-linked advanced persistent threat group “APT31” reportedly cloned and deployed a zero-day exploit developed by NSA's Equation Group in 2013.

    Read Report
  • Check out our Weekly Intelligence Summary

    Access Here
  • Exposed Credentials Solutions Guide

    Exposed Credentials Solutions Guide

    This guide draws from best practices suggested in SearchLight’s playbooks, so security professionals can improve their tools and processes to prevent employee account takeover.

    Read Report
  • 6 Considerations When Purchasing Threat Intelligence

    6 Considerations When Purchasing Threat Intelligence

    When selecting the optimal Cyber Threat Intelligence solution for your organization, use this guide to assess threat intelligence providers across 6 critical categories.

    Read Report
  • Holiday Cybercrime: Krampus is in Town

    Holiday Cybercrime: Krampus is in Town

    In this blog, we explore how cybercriminals are taking advantage of not-so-cheery sales this holiday season. From carding methods to account sales, nothing is off-limits.

    Read Post
  • Digital Shadows’ Top Five Blogs of 2020

    Digital Shadows’ Top Five Blogs of 2020

    We are here to go through the top five blogs of 2020—one for each quarter plus a bonus one to quickly recap why they (still) matter and be better prepared for the exciting new year in security.

    Read Post
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Impersonator Syndrome: Supply chain lures and COVID-19 cures

    Impersonator Syndrome: Supply chain lures and COVID-19 cures

    While we’ve reported on recent Q3 ransomware campaigns targeting the healthcare industry, a new campaign targeting COVID-19 vaccine supply chain partners has emerged.

    Read Post
  • loading
    Loading More...