Our Latest Digital Risk Protection Resources, Tips, and Best Practices

Browse our digital risk protection and threat intelligence resources center to learn how to protect your business against risks on the open, deep, and dark web.

  • Weekly: Sunburst, Sunspot, and more on SolarWinds!

    Weekly: Sunburst, Sunspot, and more on SolarWinds!

    ShadowTalk hosts Alec, Charles, Austin, and Ivan bring you the latest in threat intelligence.

    Read Post
  • Resources for Your Team during the Coronavirus Pandemic

    Take Me There
  • Weekly Intelligence Summary 15 January

    Weekly Intelligence Summary 15 January

    A cyber-security firm released a free decryptor for the popular and sophisticated “DarkSide” ransomware.

    Read Report
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • Weekly: SolarWinds Updates, TicketMaster Fraud, Apex Cyber Attack, and More!

    Weekly: SolarWinds Updates, TicketMaster Fraud, Apex Cyber Attack, and More!

    ShadowTalk hosts Stefano, Kim, Adam, and Dylan bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 08 January

    Weekly Intelligence Summary 08 January

    The cyber-security industry learned some valuable lessons during the unique and unprecedented year of 2020.

    Read Report
  • Check out our Weekly Intelligence Summary

    Access Here
  • 2021 Cybersecurity Forecasts: Trends and Predictions For the New Year31:28

    2021 Cybersecurity Forecasts: Trends and Predictions For the New Year

    In this session, Digital Shadows will share their insights and assessments into what we can expect to see in 2021.

    Watch Video
  • Holiday Cybercrime: Krampus is in Town

    Holiday Cybercrime: Krampus is in Town

    In this blog, we explore how cybercriminals are taking advantage of not-so-cheery sales this holiday season. From carding methods to account sales, nothing is off-limits.

    Read Post
  • Want To Try Our Digital Risk Protection Tool?

    Get Started Free
  • Digital Shadows’ Top Five Blogs of 2020

    Digital Shadows’ Top Five Blogs of 2020

    We are here to go through the top five blogs of 2020—one for each quarter plus a bonus one to quickly recap why they (still) matter and be better prepared for the exciting new year in security.

    Read Post
  • Heard our ShadowTalk Threat Intelligence Podcast?

    Subscribe Here!
  • Impersonator Syndrome: Supply chain lures and COVID-19 cures

    Impersonator Syndrome: Supply chain lures and COVID-19 cures

    While we’ve reported on recent Q3 ransomware campaigns targeting the healthcare industry, a new campaign targeting COVID-19 vaccine supply chain partners has emerged.

    Read Post
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Weekly: Gootkit & REvil, Spam Haus Findings, and More!

    Weekly: Gootkit & REvil, Spam Haus Findings, and More!

    ShadowTalk hosts Kacey, Charles, Alec, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

    Read Post
  • How Cybercriminals Answer “What do you do for a living?”

    How Cybercriminals Answer “What do you do for a living?”

    Have you ever wondered how cybercriminals explain their mysterious means of income to others? While not all threat actors’ illicit ...

    Read Post
  • ×

    Live Webinar on
    January 27th:

    SearchLight and Azure AD: Auto Validate Exposed Credentials

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2021 January - Exposed Credentials Webinar Session
    Thank you!
    Error - something went wrong!
  • THE TOP 3 CYBERSECURITY THREATS IN THE MIDDLE EAST

    THE TOP 3 CYBERSECURITY THREATS IN THE MIDDLE EAST

    Rising rates of cybercriminal activities occur as threat actors observe the flourishing economies in the Middle East.

    Read Post
  • 2021 Forecasts: Six Trends And Predictions For The New Year

    2021 Forecasts: Six Trends And Predictions For The New Year

    This year has been a real doozy, y’all: Ransomware capitalizing on extortion, operators compromising thousands of organizations, the COVID-19 pandemic ...

    Read Post
  • Egregor: The New Ransomware Variant to Watch

    Egregor: The New Ransomware Variant to Watch

    INTRODUCING EGREGOR RANSOMWARE GROUP First observed on September 25th, 2020, the Egregor ransomware variant has been making considerable strides in ...

    Read Post
  • Exposed Document Datasheet

    Exposed Document Datasheet

    Read Report
  • To Code or Not to Code? Cybercriminals and the world of programming

    To Code or Not to Code? Cybercriminals and the world of programming

    If you keep a pulse on the technology sector or have take note of billboard ads in any urban area ...

    Read Post
  • Simplifying Cybercriminal Jargon: A Glossary of Cybercriminal Access Offerings

    Simplifying Cybercriminal Jargon: A Glossary of Cybercriminal Access Offerings

    With advertisements for access to compromised victim networks becoming increasingly prevalent across cybercriminal platforms, Digital Shadows has compiled the following ...

    Read Post
  • Weekly: SandWorm Indicted by DOJ, Darkside Has A Soft Spot, and Ryuk's Super Speedy Attack!

    Weekly: SandWorm Indicted by DOJ, Darkside Has A Soft Spot, and Ryuk's Super Speedy Attack!

    ShadowTalk hosts Kacey, Alec, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

    Read Post
  • Webinar: Understanding the Risk of Exposed Access Keys25:21

    Webinar: Understanding the Risk of Exposed Access Keys

    In this webinar, attendees will learn about Digital Shadows' most recent research into exposed access keys, as well as the solutions available for security teams to gain this visibility.

    Watch Video
  • Digital Shadows in 60 Seconds0:55

    Digital Shadows in 60 Seconds

    Watch Video
  • Dark pathways into cybercrime: Minding the threat actor talent gap

    Dark pathways into cybercrime: Minding the threat actor talent gap

    Digital Shadows recently published two blogs looking at how threat actors express their personality on cybercriminal forums — either inadvertently ...

    Read Post
  • loading
    Loading More...