Latest Content

  • Weekly: A History of Ransomware, deBridge Hack Details, Advice for Multiple Ransomware Attacks

    Weekly: A History of Ransomware, deBridge Hack Details, Advice for Multiple Ransomware Attacks

    ShadowTalk host Chris alongside Stefano bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 12 Aug

    Weekly Intelligence Summary 12 Aug

    Read Report
  • Meet DUMPS Forum: A pro-Ukraine, anti-Russia cybercriminal forum

    Meet DUMPS Forum: A pro-Ukraine, anti-Russia cybercriminal forum

    A new, pro-Ukrainian and anti-Russian and anti-Belarus forum has since been identified, allowing users to get involved in the fight. Check out the details for “DUMPS Forum” in our latest blog.

    Read Post
  • Weekly: Cyber Threat Intelligence Aids Ukraine, Conti Stops Data Leak, LockBit's New Bounty Program

    Weekly: Cyber Threat Intelligence Aids Ukraine, Conti Stops Data Leak, LockBit's New Bounty Program

    ShadowTalk host Chris alongside Stefano and Kim bring you the latest in threat intelligence. This week they cover: * Recent advances in cyber threat intelligence and end-point protection have...

    Read Post
  • Market differentiation: Cybercriminal forums’ unusual features designed to attract users

    Market differentiation: Cybercriminal forums’ unusual features designed to attract users

    After a tumultuous few months at the start of the year in which each week seemed to bring a major ...

    Read Post
  • Digital Shadows Named #1 in Digital Risk Protection

    Read Report
  • NATO Leaders are Meeting at the Madrid Summit 2022: What is going to happen?

    NATO Leaders are Meeting at the Madrid Summit 2022: What is going to happen?

    Today, the leaders of the North Atlantic Treaty Organization (NATO) are gathering in Madrid, Spain for their annual Summit, where ...

    Read Post
  • Vulnerability Intelligence Roundup: Leveraging the OODA Loop for Vulnerability Management

    Vulnerability Intelligence Roundup: Leveraging the OODA Loop for Vulnerability Management

    Picture this, you are an analyst working in a large security operations center (SOC) responding to an overwhelming amount of ...

    Read Post
  • Russian prison culture and slang on cybercriminal forums: Can you cram on the hairdryer?

    Russian prison culture and slang on cybercriminal forums: Can you cram on the hairdryer?

    In a few previous blogs, we’ve covered how threat actors discuss prison on Russian-language cybercriminal platforms. We’ve touched on high-profile ...

    Read Post
  • Account takeover: Are you opening the door for cyber threat actors?

    Account takeover: Are you opening the door for cyber threat actors?

    In 2020, our research report on account takeover (ATO) highlighted the risk of using credentials in an unsafe manner, which ...

    Read Post
  • Vulnerability Intelligence Round Up:  The Good, The Bad, and The Risky

    Vulnerability Intelligence Round Up: The Good, The Bad, and The Risky

    There is a saying derived from Western movies that say whoever draws first, loses the duel. Nick Bohr, a famous ...

    Read Post
  • What we’re reading this month: May 2022

    What we’re reading this month: May 2022

    Where is the year going? It only seems like yesterday that we celebrated the turn of the year, with the ...

    Read Post
  • Advanced persistent threat group feature: Mustang Panda

    Advanced persistent threat group feature: Mustang Panda

    Advanced persistent threat (APT) groups are often tricky to wrap your head around. By their nature, state-associated groups are well-resourced ...

    Read Post
  • Five years after the WannaCry dumpster fire, ransomware remains a global threat

    Five years after the WannaCry dumpster fire, ransomware remains a global threat

    It has been five years since the dumpster fire we all remember as WannaCry. WannaCry is self-propagating ransomware that held ...

    Read Post
  • Weekly: The Return of REvil, China APT Activity, Russia-Ukraine RoundUp

    Weekly: The Return of REvil, China APT Activity, Russia-Ukraine RoundUp

    ShadowTalk host Chris alongside Ivan and Nicole bring you the latest in threat intelligence. This week they cover: * REvil ransomware returns with new malware * Moshen Dragon targeting...

    Read Post
  • ALPHV: The First Rust-Based Ransomware

    ALPHV: The First Rust-Based Ransomware

    In late 2021, we observed a new ransomware operation named “ALPHV” (also known as BlackCat) emerge. The group operates as ...

    Read Post
  • Colonial Pipeline One Year Later: What’s Changed?

    Colonial Pipeline One Year Later: What’s Changed?

    For the first half of 2021, ransomware groups looked unstoppable. Ransomware gangs were adding victim after victim on their dark ...

    Read Post
  • The Russia – Ukraine war: Two months in

    The Russia – Ukraine war: Two months in

    The two-month mark of the Russia and Ukraine war has passed, with Russia almost certainly having failed to meet its ...

    Read Post
  • Opportunity in the midst of chaos: Russian-speaking cybercriminals grapple with sanctions and forum takedowns

    Opportunity in the midst of chaos: Russian-speaking cybercriminals grapple with sanctions and forum takedowns

    As a threat intelligence professional, it’s difficult to ignore how major developments in the real world affect the lives of ...

    Read Post
  • The Power Of Data Analysis In Threat Intelligence – Part 2: Machine Learning

    The Power Of Data Analysis In Threat Intelligence – Part 2: Machine Learning

    This blog is the second part of our Data Analysis in Threat Intelligence series, where we focus on the tools ...

    Read Post
  • What We’re Reading This Month: April 2022

    What We’re Reading This Month: April 2022

    As an intelligence analyst, it’s paramount to stay on top of what’s happening in the world around you. To inform ...

    Read Post
  • loading
    Loading More...