Our Latest Digital Risk Protection Resources, Tips, and Best Practices

Browse our digital risk protection and threat intelligence resources center to learn how to protect your business against risks on the open, deep, and dark web.

  • Weekly: CISA guidelines, Q2 Ransomware roundup, and PunkSpider’s back!

    Weekly: CISA guidelines, Q2 Ransomware roundup, and PunkSpider’s back!

    ShadowTalk hosts Sean, Alec, Rick, and Ivan bring you the latest in threat intelligence. They cover CISA guidelines on frequently exploited vulnerabilities
, Q2 Ransomware and PunkSpider.

    Read Post
  • Weekly Intelligence Summary 23rd July

    Weekly Intelligence Summary 23rd July

    Read Report
  • Want To Try Our Digital Risk Protection Tool?

    Get Started Free
  • Impersonating Domains Report

    Impersonating Domains Report

    In this report, Digital Shadows’ Photon Team analyzed a data set of more than 175,000 impersonating domains raised to our clients over four months of 2021.

    Read Report
  • Initial Access Brokers: A Deep Dive

    On-demand Webinar

    Watch Here
  • Weekly Intelligence Summary 16th July

    Weekly Intelligence Summary 16th July

    Read Report
  • Domain Monitoring Solutions Guide

    Domain Monitoring Solutions Guide

    This guide outlines what potential data sources, detection methods, context, and remediation actions to consider if you want to effectively monitor domains and mitigate the risk of data loss, exposed

    Read Report
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • Common Typosquat and Combosquat Techniques

    Common Typosquat and Combosquat Techniques

    This infographic details the two high level types of domain impersonation: typosquats and combosquats, and the 10 different strategies used by threat actors.

    Read Report
  • Exposed Credentials Solutions Guide

    Get Your Copy
  • Weekly: VPN Vulnerabilities, EA Gets Attacked, Plus Clop Deals With Affiliate Arrests

    Weekly: VPN Vulnerabilities, EA Gets Attacked, Plus Clop Deals With Affiliate Arrests

    ShadowTalk hosts Sean, Ivan, and Charles bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 18 June

    Weekly Intelligence Summary 18 June

    A newly identified advanced persistent threat (APT) group, “Agrius”, has been exposed as the perpetrator of destructive attacks against Israeli organizations since late 2020.

    Read Report
  • Weekly: Drug Kingpin Taken Down by Cheese and Ransomware Makes a Comeback

    Weekly: Drug Kingpin Taken Down by Cheese and Ransomware Makes a Comeback

    ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 28 May

    Weekly Intelligence Summary 28 May

    US President Joe Biden recently signed an executive order (EO) aimed at strengthening network security for US federal government departments, and agencies and contractors working with them.

    Read Report
  • Dark Web Monitoring Solutions Guide

    Dark Web Monitoring Solutions Guide

    This guide shares years of operational best practices and expands on where dark web intelligence is useful and can be effectively leveraged into action for security teams.

    Read Report
  • Weekly: Colonial Pipeline Updates, DarkSide Feels the Pressure, and More!

    Weekly: Colonial Pipeline Updates, DarkSide Feels the Pressure, and More!

    ShadowTalk hosts Sean, Alec, Ivan, and Charles bring you the latest in threat intelligence.

    Read Post
  • Resources for Your Team during the Coronavirus Pandemic

    Take Me There
  • Weekly Intelligence Summary 21 May

    Weekly Intelligence Summary 21 May

    A “Conti” ransomware attack on Ireland’s healthcare system, the Health Service Executive (HSE), significantly delayed the delivery of medical laboratory results and affected many outpatient services.

    Read Report
  • Weekly: The Colonial Pipeline Incident, BEC Gift Card Campaigns, and More!

    Weekly: The Colonial Pipeline Incident, BEC Gift Card Campaigns, and More!

    ShadowTalk hosts Stefano, Chris, Kim, and Xue bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 14 May

    Weekly Intelligence Summary 14 May

    Colonial Pipeline Company fell victim to a cyber attack that resulted in 5,500 miles of its US fuel pipelines being shut down, causing public distress and fears of fuel shortages.

    Read Report
  • Check out our Weekly Intelligence Summary

    Access Here
  • Weekly: VPN Vulnerabilities, Supply Chain Attacks, and Babuk Says “Bye”!

    Weekly: VPN Vulnerabilities, Supply Chain Attacks, and Babuk Says “Bye”!

    ShadowTalk hosts Alec, Ivan, Sean, and Digital Shadows CISO, Rick, bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 07 May

    Weekly Intelligence Summary 07 May

    Security researchers discovered two unrelated cyber-threat campaigns targeting Microsoft SharePoint.

    Read Report
  • Cyber Threat Intelligence Solutions Guide

    Cyber Threat Intelligence Solutions Guide

    This guide outlines best practices for cyber threat intelligence and features resources to leverage when developing or improving your organization's cyber threat intelligence capabilities.

    Read Report
  • Weekly: Supply Chain Attacks Rule The Day, Plus The FBI Takes On Web-Shells

    Weekly: Supply Chain Attacks Rule The Day, Plus The FBI Takes On Web-Shells

    ShadowTalk hosts Alec, Ivan, Charles, and newcomer, Sean, bring you the latest in threat intelligence.

    Read Post
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Weekly Intelligence Summary 23 April

    Weekly Intelligence Summary 23 April

    The FBI made digital copies of malicious web-shells before removing them from hundreds of vulnerable servers in the US, without any warning to affected organizations.

    Read Report
  • loading
    Loading More...