Latest Content

  • Russian prison culture and slang on cybercriminal forums: Can you cram on the hairdryer?

    Russian prison culture and slang on cybercriminal forums: Can you cram on the hairdryer?

    In a few previous blogs, we’ve covered how threat actors discuss prison on Russian-language cybercriminal platforms. We’ve touched on high-profile ...

    Read Post
  • Account takeover: Are you opening the door for cyber threat actors?

    Account takeover: Are you opening the door for cyber threat actors?

    In 2020, our research report on account takeover (ATO) highlighted the risk of using credentials in an unsafe manner, which ...

    Read Post
  • Vulnerability Intelligence Round Up:  The Good, The Bad, and The Risky

    Vulnerability Intelligence Round Up: The Good, The Bad, and The Risky

    There is a saying derived from Western movies that say whoever draws first, loses the duel. Nick Bohr, a famous ...

    Read Post
  • What we’re reading this month: May 2022

    What we’re reading this month: May 2022

    Where is the year going? It only seems like yesterday that we celebrated the turn of the year, with the ...

    Read Post
  • Advanced persistent threat group feature: Mustang Panda

    Advanced persistent threat group feature: Mustang Panda

    Advanced persistent threat (APT) groups are often tricky to wrap your head around. By their nature, state-associated groups are well-resourced ...

    Read Post
  • Digital Shadows Named #1 in Digital Risk Protection

    Read Report
  • Five years after the WannaCry dumpster fire, ransomware remains a global threat

    Five years after the WannaCry dumpster fire, ransomware remains a global threat

    It has been five years since the dumpster fire we all remember as WannaCry. WannaCry is self-propagating ransomware that held ...

    Read Post
  • Weekly: The Return of REvil, China APT Activity, Russia-Ukraine RoundUp

    Weekly: The Return of REvil, China APT Activity, Russia-Ukraine RoundUp

    ShadowTalk host Chris alongside Ivan and Nicole bring you the latest in threat intelligence. This week they cover: * REvil ransomware returns with new malware * Moshen Dragon targeting...

    Read Post
  • ALPHV: The First Rust-Based Ransomware

    ALPHV: The First Rust-Based Ransomware

    In late 2021, we observed a new ransomware operation named “ALPHV” (also known as BlackCat) emerge. The group operates as ...

    Read Post
  • Colonial Pipeline One Year Later: What’s Changed?

    Colonial Pipeline One Year Later: What’s Changed?

    For the first half of 2021, ransomware groups looked unstoppable. Ransomware gangs were adding victim after victim on their dark ...

    Read Post
  • The Russia – Ukraine war: Two months in

    The Russia – Ukraine war: Two months in

    The two-month mark of the Russia and Ukraine war has passed, with Russia almost certainly having failed to meet its ...

    Read Post
  • Opportunity in the midst of chaos: Russian-speaking cybercriminals grapple with sanctions and forum takedowns

    Opportunity in the midst of chaos: Russian-speaking cybercriminals grapple with sanctions and forum takedowns

    As a threat intelligence professional, it’s difficult to ignore how major developments in the real world affect the lives of ...

    Read Post
  • The Power Of Data Analysis In Threat Intelligence – Part 2: Machine Learning

    The Power Of Data Analysis In Threat Intelligence – Part 2: Machine Learning

    This blog is the second part of our Data Analysis in Threat Intelligence series, where we focus on the tools ...

    Read Post
  • What We’re Reading This Month: April 2022

    What We’re Reading This Month: April 2022

    As an intelligence analyst, it’s paramount to stay on top of what’s happening in the world around you. To inform ...

    Read Post
  • The role of Non-Fungible Tokens (NFTs) in facilitating cybercrime

    The role of Non-Fungible Tokens (NFTs) in facilitating cybercrime

    You’d have to have been living under a rock to have avoided the excitement surrounding Non-Fungible-Tokens (NFTs) in the last ...

    Read Post
  • Weekly: Cybercriminal Forums Go Down & Cyber Activity in the Russia-Ukraine War Go Up

    Weekly: Cybercriminal Forums Go Down & Cyber Activity in the Russia-Ukraine War Go Up

    ShadowTalk host Stefano alongside Rory bring you the latest in threat intelligence. This week they cover: * 'RaidForums' has been shut down and seized * SandWorm targets electrical substations in...

    Read Post
  • Q1 2022 Vulnerability Roundup

    Q1 2022 Vulnerability Roundup

    In the first quarter of 2022, several high-severity vulnerabilities were targeted by threat actors to facilitate malicious campaigns. The first ...

    Read Post
  •  Q1 2022 Ransomware Roundup

     Q1 2022 Ransomware Roundup

    As the new year has reached the end of its first quarter, it’s time for us to go back and ...

    Read Post
  • Intelligence Collection Plans: Preparation breeds success

    Intelligence Collection Plans: Preparation breeds success

    It’s been a little over a month since I wrote about how intelligence requirements (IRs) can help plan a cyber ...

    Read Post
  • Team A vs Team B: What is Motivating Lapsus$?

    Team A vs Team B: What is Motivating Lapsus$?

    In the past few weeks, the Lapsus$ threat group captured the security community’s attention with a series of brazen and ...

    Read Post
  • Five things we learned from the Conti chat logs

    Five things we learned from the Conti chat logs

    At the end of February, the cybersecurity community was rocked by the appearance of alleged chat logs recording conversations between ...

    Read Post
  • loading
    Loading More...