Attack Surface Reduction

Manage your attack surface and reduce the ways that an attacker can target your organization.

  • Digital Footprint Monitoring

    Digital Footprint Monitoring

    Gain an attackers-eye-view of your external-facing infrastructure.

    Read Report
  • Check out our Weekly Intelligence Summary

    Access Here
  • ×

    3 Reasons the Cybercriminal Forum is
    NOT Dead

    - Dec 17th -
    Live Webinar

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 December Cybercriminal Forums Webinar
    Thank you!
    Error - something went wrong!
  • Honeypots: Tracking Attacks Against Misconfigured or Exposed Services

    Honeypots: Tracking Attacks Against Misconfigured or Exposed Services

    Honeypots can be useful tools for gathering information on current attack techniques. Conversely, they can be an overwhelming source of ...

    Read Post
  • Reducing Your Attack Surface

    Reducing Your Attack Surface

    What is an attack surface According to OWASP, an attack surface “describes all of the different points where an attacker could ...

    Read Post
  • Identify weak spots in your infrastructure

    Request a Demo
  • Detecting Infrastructure Weaknesses - Open Ports | Case Study

    Detecting Infrastructure Weaknesses - Open Ports | Case Study

    See how a technology company prevented a possible ransomware infection.

    Read Report
  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • Weekly Intelligence Summary 05 Dec - 12 Dec 2019

    Weekly Intelligence Summary 05 Dec - 12 Dec 2019

    “Lazarus Group” has been linked to a new trojanized Mac OS X application, demonstrating the threat group’s preference for employing OS X malware over the past two years.

    Read Report
  • Tochka Dark Web Market Offline, Market.ms Closes, And Data Leakage Stories

    Tochka Dark Web Market Offline, Market.ms Closes, And Data Leakage Stories

    Alex, Harrison, Kacey, and Charles chat this week on some dark web and cybercriminal updates, data leakage stories that have hit the news, plus a GDPR story where an ISP was hit with a €9.6...

    Read Post
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias

    A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias

    This blog seeks to rebalance intelligence tradecraft discussions by highlighting some of the less glamorous everyday sources of bias that are too often overlooked.

    Read Post
  • Understanding the Different Cybercriminal Platforms: AVCs, Marketplaces, and Forums

    Understanding the Different Cybercriminal Platforms: AVCs, Marketplaces, and Forums

    We’re all familiar with forums and marketplaces (we use them in our daily lives – think Reddit, eBay, or Amazon, for example), but what exactly is an AVC? What do they look like?

    Read Post
  • ERP Applications Under Fire

    ERP Applications Under Fire

    The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what

    Read Report
  • Episode 46: Supply Chain and Third-Party Risks

    Episode 46: Supply Chain and Third-Party Risks

    Following on from last week’s conversation on how managed service providers can increase your attack surface, Simon Hall and Richard Gold join Rafael Amado to discuss supply chain risks. With so...

    Read Post
  • Attack Surface Reduction Overview

    Attack Surface Reduction Overview

    As your infrastructure grows and becomes more complex, it can be difficult to keep up with expanding attack surfaces. Attackers are aware of this and frequently look to exploit public-facing app...

    Read Report
  • Digital Risk Protection: Forrester New Wave Report

    Digital Risk Protection: Forrester New Wave Report

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

    Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

    How can the modern network of .onion marketplaces be understood through novels about a cyberpunk dystopia? The answer is in how dark web marketplaces grow and die.

    Read Post
  • Two-Factor in Review

    Two-Factor in Review

    A technical assessment of the most popular mitigation for account takeover attacks

    Read Report
  • A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.

    Read Report
  • Extortion Exposed: Sextortion, thedarkoverlord, and SamSam

    Extortion Exposed: Sextortion, thedarkoverlord, and SamSam

    In our most recent research, A Tale of Epic Extortions, the Digital Shadows Photon Research Team approached the topic of ...

    Read Post
  • Digital Risk: The C-Suite's Critical Missing Part of Overall Risk

    Digital Risk: The C-Suite's Critical Missing Part of Overall Risk

    In this report, you will learn the emergence of Digital Risk Protection, a framework for protecting against Digital Risks, questions the C-Suite should be asking.

    Read Report
  • Powering Investigations with Nuix Software: The Case of thedarkoverlord and the 9/11 Files

    Powering Investigations with Nuix Software: The Case of thedarkoverlord and the 9/11 Files

    The Panama Papers in 2016 highlighted the challenges facing investigators dealing with large document leaks. With over 11.5 million documents ...

    Read Post
  • FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar50:49

    FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar

    Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr

    Watch Video
  • loading
    Loading More...