Latest Content

Browse our digital risk protection and threat intelligence resources center to learn how to protect your business against risks on the open, deep, and dark web.

  • Digital Risk Protection 2018 Forrester New Wave

    Digital Risk Protection 2018 Forrester New Wave

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • Don’t Just Read Intelligence: Learn From It

    Don’t Just Read Intelligence: Learn From It

    Digital Shadows and Immersive Labs Partner to Reduce Mean-Time-To-Learn for Security Professionals

    Read Post
  • Weekly Intelligence Summary: Ep 2

    Weekly Intelligence Summary: Ep 2

    This week Alex and Philip join Harrison to discuss two recent, unrelated, financially motivated cyber attack campaigns involving the use of culturally specific social engineering lures. The team...

    Read Post
  • Thedarkoverlord runs out of Steem

    Thedarkoverlord runs out of Steem

    On 31 December 2018, the notorious extortion actor known as “thedarkoverlord” announced on Twitter and Reddit that they were in ...

    Read Post
  • Weekly Intelligence Summary

    Access Here
  • FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar50:49

    FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar

    Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr

    Watch Video
  • Searchlight

    Searchlight

    Digital Shadows SearchLight™ helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface.

    Read Report
  • Test Drive SearchLight™ Free

    Get Started Now
  • Episode 57: Singapore Healthcare Breach

    Episode 57: Singapore Healthcare Breach

    For this week’s ShadowTalk deep dive, we called in Doctor Richard Gold to discuss the major healthcare breach affecting SingHealth, Singapore’s largest group of healthcare organizations.

    Read Post
  • Weekly Intelligence Summary 03 Jan - 10 Jan 2019

    Weekly Intelligence Summary 03 Jan - 10 Jan 2019

    Highlights from the week include: a new data skimming campaign attributed to the threat group “Magecart”, a security researcher’s phishing-campaign tool that can bypass two-factor authentication (2FA)

    Read Report
  • ×

    Join 150k subscribers and get the latest news & threat intel in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • TV License and Vehicle Tax Fraud: New Year, Same Old Scams

    TV License and Vehicle Tax Fraud: New Year, Same Old Scams

    Over the last week we’ve been tracking several emails impersonating UK services such as “TV Licensing” and “Vehicle Road Tax”. ...

    Read Post
  • Four New Year Cyber Security Resolutions

    Four New Year Cyber Security Resolutions

    Another year is upon us in the world of cyber-security, and few things are certain. Commentators are always prone to ...

    Read Post
  • Subscribe to ShadowTalk on iTunes!

    Subscribe Now
  • Digital Shadows Company Overview Video3:05

    Digital Shadows Company Overview Video

    Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.

    Watch Video
  • 2019 Cyber Security Forecasts: Six Things on the Horizon

    2019 Cyber Security Forecasts: Six Things on the Horizon

    For this blog, we looked at trends and events that have shaped the digital risk landscape this year and how they might play out in 2019.

    Read Post
  • Security Analyst Spotlight Series: Phil Doherty

    Security Analyst Spotlight Series: Phil Doherty

    Organizations rely on Digital Shadows to be an extension of their security team. Our global team of analysts provide relevant ...

    Read Post
  • Cyber Threats to Watch in 2019: Key Takeaways from our webinar with the FBI Cyber Squad

    Cyber Threats to Watch in 2019: Key Takeaways from our webinar with the FBI Cyber Squad

    As 2018 comes to a close, Digital Shadows partnered with the FBI’s Cyber Division for a webinar to discuss some ...

    Read Post
  • Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    We cover a range of the different techniques attackers of all persuasions (whether sophisticated nation state or low-level hacker) choose when performing their phishing campaigns.

    Read Post
  • Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework

    Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework

    We took our recent work on the Mitre ATT&CK framework and various indictments of cyber criminals and nation state actors and mapped them to the Essential 8 framework.

    Read Report
  • Mitigating the Top 7 Dark Web Threats to Your Enterprise59:01

    Mitigating the Top 7 Dark Web Threats to Your Enterprise

    The dark web continues to pose extremely dangerous threats as cyber criminals coordinate attacks and trade intelligence about your enterprise. Join us for us for an informative session on the 7 most p

    Watch Video
  • Cybercriminals on the Outlook for Your Emails

    Cybercriminals on the Outlook for Your Emails

    In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.

    Read Report
  • Digital Shadows Overview

    Digital Shadows Overview

    Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats.

    Read Report
  • 5 Ways Cybercriminals Can Access Your Emails Without Phishing

    5 Ways Cybercriminals Can Access Your Emails Without Phishing

    Here are 5 ways that cybercriminals gain access to emails without conducting a phishing campaign or network intrusion.

    Read Report
  • loading
    Loading More...