Latest Content

Browse our digital risk and threat intelligence resources hub.

  • Digital Shadows Company Overview Video3:05

    Digital Shadows Company Overview Video

    Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.

    Watch Video
  • Alleged Carbanak Files and Source Code Leaked: Digital Shadows’ Initial Findings

    Alleged Carbanak Files and Source Code Leaked: Digital Shadows’ Initial Findings

    Digital Shadows’ Russian-linguists discovered a post from 6 July 2018 on exploit[.]in that provided files and source code that were ...

    Read Post
  • ×

    Subscribe to get the latest news and threat intelligence in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age

    The State of Cybercrime in the Post-AlphaBay and Hansa Age

    Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.

    Read Report
  • Cyber Threats to the 2018 Football World Cup: Traditional Rules or a New Style of Play?

    Cyber Threats to the 2018 Football World Cup: Traditional Rules or a New Style of Play?

    The tension and excitement that precedes all global sporting events is beginning to build towards the start of this year’s ...

    Read Post
  • Demystifying the Dark Web and Mitigating Risks1:03:52

    Demystifying the Dark Web and Mitigating Risks

    Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.

    Watch Video
  • Reducing Your Attack Surface: From a Firehose to a Straw

    Reducing Your Attack Surface: From a Firehose to a Straw

    What is Attack Surface Reduction? Attack Surface Reduction is a powerful tool used to protect and harden environments. It’s a ...

    Read Post
  • Security Analyst Spotlight Series: Harrison Van Riper5:15

    Security Analyst Spotlight Series: Harrison Van Riper

    In this series, we bring our analysts out of the shadows and into the spotlight, showcasing their expertise and interests so you can learn a bit more about a “day-in-the-life” of a Digital Shadows Int

    Watch Video
  • Subscribe to Shadow Talk Podcast on iTunes!

    Click Here
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age: Recorded Webinar18:45

    The State of Cybercrime in the Post-AlphaBay and Hansa Age: Recorded Webinar

    Almost one year since the AlphaBay and Hansa takedowns, no single online criminal marketplace has risen to the top. What has prevented a new marketplace from flourishing?

    Watch Video
  • Diversity and the Digital Shadows Women’s Network

    Diversity and the Digital Shadows Women’s Network

    If you haven’t already watched RBG – a movie about the incredible life of U.S. Supreme Court Justice Ruth Bader ...

    Read Post
  • ×

    Request a Free
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • Digital Shadows Overview

    Digital Shadows Overview

    Digital Shadows monitors and manages an organization’s digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web.

    Read Report
  • Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs

    Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs

    The Payment Card Industry recently passed a deadline requiring that all e-commerce sites and merchants cease supporting TLS 1.0. With this and older protocols such as SSL vulnerable to...

    Read Post
  • Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.

    Read Report
  • Introducing Shadow Search for Digital Shadows SearchLight™

    Introducing Shadow Search for Digital Shadows SearchLight™

    Introducing Shadow Search - Quickly enable deeper research and investigation.

    Read Report
  • 7 Ways the Digital Risk Revolution Changes Risk and Compliance53:06

    7 Ways the Digital Risk Revolution Changes Risk and Compliance

    CTO and co-founder of Digital Shadows joins VP of Development at Lockpath for a webinar around how the digital risk revolution changes risk and compliance.

    Watch Video
  • How Cybercriminals are Using Messaging Platforms

    How Cybercriminals are Using Messaging Platforms

    Alternative Ways Criminals Transact Online: A Moving Target Last week, the cracking forum (specialized in tools for gaining unauthorized access ...

    Read Post
  • 5 Cyber Threats to Financial Services: Part One, Insiders

    5 Cyber Threats to Financial Services: Part One, Insiders

    The sensitive and financial data held by banks and financial institutions, as well as their centrality to national infrastructure, makes ...

    Read Post
  • Digital Shadows - Monitor, Manage, and Remediate Your Digital Risk1:32

    Digital Shadows - Monitor, Manage, and Remediate Your Digital Risk

    See how Digital Shadows monitors, manages, and remediates digital risk across the widest range of data sources within the open, deep, and dark web.

    Watch Video
  • Cryptocurrency - The New Gold Rush for Cybercriminals

    Cryptocurrency - The New Gold Rush for Cybercriminals

    Cybercriminals have developed several schemes to defraud those looking to profit from the growth in cryptocurrencies.

    Read Report
  • [Infographic] 18 Reasons for Digital Risk Management

    [Infographic] 18 Reasons for Digital Risk Management

    Learn 18 reasons why your organization needs digital risk management in this infographic.

    Read Report
  • ESG: The Pressing Need for Digital Risk Management

    ESG: The Pressing Need for Digital Risk Management

    CISOs and risk officers must adopt a thorough digital risk management strategy that includes monitoring, filtering, prioritizing, and responding to threats across the public Internet and dark web.

    Read Report
  • loading
    Loading More...