Our Latest Digital Risk Protection Resources, Tips, and Best Practices

Browse our digital risk protection and threat intelligence resources center to learn how to protect your business against risks on the open, deep, and dark web.

  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • Digital Risk Protection: Forrester New Wave Report

    Digital Risk Protection: Forrester New Wave Report

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat

    Read Post
  • Weekly Intelligence Summary 10 Oct - 17 Oct 2019

    Weekly Intelligence Summary 10 Oct - 17 Oct 2019

    In the spotlight this week is the “Simjacker” exploit, publicly disclosed in September 2019 and now potentially affecting entities across 29 countries.

    Read Report
  • Check out our Weekly Intelligence Summary

    Access Here
  • Honeypots: Tracking Attacks Against Misconfigured or Exposed Services

    Honeypots: Tracking Attacks Against Misconfigured or Exposed Services

    Honeypots can be useful tools for gathering information on current attack techniques. Conversely, they can be an overwhelming source of ...

    Read Post
  • Typosquatting and the 2020 U.S. Election, Honeypots, And Sudo Vulnerability

    Typosquatting and the 2020 U.S. Election, Honeypots, And Sudo Vulnerability

    Kacey, Charles, Harrison, and Alex kick off this week’s episode talking about our Fall Dallas team event (an amateur version of Chopped). Then we dig into the hot topics of the week.

    Read Post
  • Want To Try Our Digital Risk Protection Tool?

    Get Started Free
  • Typosquatting and the 2020 U.S. Presidential election10:00

    Typosquatting and the 2020 U.S. Presidential election

    Photon Research Team thought it would be interesting to use this pool of candidates as a backdrop for research into typosquatted domains

    Watch Video
  • Heard our ShadowTalk Threat Intelligence Podcast?

    Subscribe Here!
  • Dark Web Monitoring: The Good, The Bad, and The Ugly

    Dark Web Monitoring: The Good, The Bad, and The Ugly

    Gaining access to dark web and deep web sources can be extremely powerful – if you focus on relevant use cases. The most successful strategies we observe have clear requirements, such as fraud detecti

    Read Post
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • SearchLight’s Biggest Ever Update: New Ways to Discover, Contextualize, and Prioritize Digital Risks

    SearchLight’s Biggest Ever Update: New Ways to Discover, Contextualize, and Prioritize Digital Risks

    Since founding the company in 2011, we’ve had some memorable milestones: from the first release of SearchLight in 2014, to ...

    Read Post
  • Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

    Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

    How can the modern network of .onion marketplaces be understood through novels about a cyberpunk dystopia? The answer is in how dark web marketplaces grow and die.

    Read Post
  • SecDevOps: Continued Database Exposures Point to Growing Challenges

    SecDevOps: Continued Database Exposures Point to Growing Challenges

    Last week, we learned that millions of Ecuadorian’s personal details had been exposed by a misconfigured ElasticSearch database. This is ...

    Read Post
  • ANU Breach Report: Mapping to Mitre ATT&CK Framework

    ANU Breach Report: Mapping to Mitre ATT&CK Framework

    We decided to map this intrusion to the Mitre ATT&CK framework, as we have done previously for:

    Read Post
  • ×

    Interactive Threat Hunting on the Dark Web Webinar

    - Nov 6th -

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 November - Interactive Dark Web
    Thank you!
    Error - something went wrong!
  • Domain Squatting: The Phisher-man’s Friend

    Domain Squatting: The Phisher-man’s Friend

    Simon talks about how easy it is to conduct domain squatting and typosquatting, and how little monitoring still goes on around them in the industry.

    Read Post
  • Top Threat Intelligence Podcasts to Add to Your Playlist

    Top Threat Intelligence Podcasts to Add to Your Playlist

    Looking for some new threat intelligence podcasts to add to your playlist? Look no further! Our Photon Threat Intelligence Research team shares their top tracks.

    Read Post
  • Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework

    Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework

    When the attacker, Andrei Tyurin, pleaded guilty, we thought we could look at the attacker goals, their TTPs and map this to the Mitre PRE-ATT&CK and ATT&CK framework.

    Read Post
  • Your Data at Risk: FBI Cyber Division Shares Top Emerging Cyber Threats to Your Enterprise

    Your Data at Risk: FBI Cyber Division Shares Top Emerging Cyber Threats to Your Enterprise

    Data breaches are not slowing down. Nobody expects to be a victim, but the data shows the exponential growth in ...

    Read Post
  • Threat Intelligence Time Management and Prioritization: An Interview with Xena Olsen

    Threat Intelligence Time Management and Prioritization: An Interview with Xena Olsen

    Rick Holland and Harrison Van Riper interview Xena Olsen in this episode of ShadowTalk. The team focus their discussion on how to get timely, but effective intelligence out the door.

    Read Post
  • WTF is Digital Risk Protection

    WTF is Digital Risk Protection

    A quick guide to understanding how your company looks to attackers.

    Read Report
  • Two-Factor in Review

    Two-Factor in Review

    A technical assessment of the most popular mitigation for account takeover attacks

    Read Report
  • Digital Shadows Company Overview Video3:05

    Digital Shadows Company Overview Video

    Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.

    Watch Video
  • loading
    Loading More...