Attack Surface Monitoring
Manage your attack surface and reduce the ways that an attacker can target your organization.
-
Initial Access Brokers Report
Initial access brokers are benefitting from a rise in adoption of remote access software. This Initial Access Brokers Report analyzes this phenomenon and what it means for security practitioners.
-
Check out our Weekly Intelligence Summary
Access Here -
Attack Surface Monitoring Overview
Gain an attackers-eye-view of online infrastructure - SearchLight identifies the most critical risks you need to care about, such as vulnerabilities on your external infrastructure with known exploits
-
Reducing Your Attack Surface
What is an attack surface According to OWASP, an attack surface “describes all of the different points where an attacker could ...
-
Identify weak spots in your infrastructure
Request a Demo -
56:31
Threat Model of a Remote Worker [Recorded Webinar]
Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has
-
COVID-19: Third-party risks to businesses
As social distancing becomes more prevalent during the COVID-19 (Coronavirus) pandemic, many organizations are moving to a virtual workplace. Organizations ...
-
A Practical Guide to Reducing Digital Risk
This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.
-
COVID-19: Risks of Third-Party Apps
As the global community continues to pursue critical details of COVID-19, it is imperative to consider the opportunistic behavior of ...
-
Approaching Cybersecurity As A Third Party Defense Contractor
Brian Neely, CIO and CISO at American Systems and Rick Holland, CISO at Digital Shadows join Harrison for a discussion around how Brian approaches cybersecurity as a defense contractor. American...
-
Third Party Risk: 4 ways to manage your security ecosystem
The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can ...
-
Honeypots: Tracking Attacks Against Misconfigured or Exposed Services
Honeypots can be useful tools for gathering information on current attack techniques. Conversely, they can be an overwhelming source of ...
-
ERP Applications Under Fire
The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what
-
Episode 46: Supply Chain and Third-Party Risks
Following on from last week’s conversation on how managed service providers can increase your attack surface, Simon Hall and Richard Gold join Rafael Amado to discuss supply chain risks. With so...
-
A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias
This blog seeks to rebalance intelligence tradecraft discussions by highlighting some of the less glamorous everyday sources of bias that are too often overlooked.
-
Understanding the Different Cybercriminal Platforms: AVCs, Marketplaces, and Forums
We’re all familiar with forums and marketplaces (we use them in our daily lives – think Reddit, eBay, or Amazon, for example), but what exactly is an AVC? What do they look like?
-
Forrester New Wave Report: Digital Risk Protection
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
-
Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction
How can the modern network of .onion marketplaces be understood through novels about a cyberpunk dystopia? The answer is in how dark web marketplaces grow and die.
-
Two-Factor in Review
A technical assessment of the most popular mitigation for account takeover attacks
-
A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure
Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.
-
Extortion Exposed: Sextortion, thedarkoverlord, and SamSam
In our most recent research, A Tale of Epic Extortions, the Digital Shadows Photon Research Team approached the topic of ...
-
Digital Risk: The C-Suite's Critical Missing Part of Overall Risk
In this report, you will learn the emergence of Digital Risk Protection, a framework for protecting against Digital Risks, questions the C-Suite should be asking.
-
Loading More...