Digital Shadows

  • Live Webinar: Account Takeover: Data Findings, Popular Tools, and Prevalent Actors

    Live Webinar: Account Takeover: Data Findings, Popular Tools, and Prevalent Actors

    Join the Photon team to learn about our latest research on account takeover.

    Read Post
  • Live Webinar: Outside-In Intelligence for DevSecOps

    Live Webinar: Outside-In Intelligence for DevSecOps

    Join Michael Marriott, PMM at Digital Shadows, to see how Digital Shadows provides outside-in intelligence for DevSecOps risks.

    Read Post
  • [Live Webinar] Dark Web Digest: Gaining Valuable Threat Intelligence from Cybercriminal Forums

    [Live Webinar] Dark Web Digest: Gaining Valuable Threat Intelligence from Cybercriminal Forums

    During this session, we will cover the risk impact of dark web findings, explore the evolution of dark web forums, and trends observed across platforms.

    Read Post
  • Live Webinar Apr 8: Operationalizing Alerts: The Problem with Sitting in Triage

    Live Webinar Apr 8: Operationalizing Alerts: The Problem with Sitting in Triage

    In this webinar, we will outline how organizations use dedicated playbooks to significantly reduce the amount of time it takes to action and respond to incidents.

    Read Post
  • Digital Shadows integriert Mimecast

    Digital Shadows integriert Mimecast

    Mehr Schutz vor Domainbetrug, Phishing & Co: Mimecast integriert das Monitoring-Tool SearchLight von #DigitalShadows.

    Read Post
  • heise BrandWorld |  Microsoft 365: Sensible Informationen schützen mit Azure Information Protection

    heise BrandWorld | Microsoft 365: Sensible Informationen schützen mit Azure Information Protection

    Mit Tools wie Azure Information Protection macht Microsoft es Unternehmen einfacher, grundlegende Sicherheitsprinzipien einzuhalten.

    Read Post
  • Taz | Big Brother hilft Microsoft

    Taz | Big Brother hilft Microsoft

    Ein US-amerikanischer Geheimdienst findet eine Windows-Sicherheitslücke und informiert Microsoft. Das könnte Teil einer neuen Strategie sein.

    Read Post
  • SecurityInsider: Doppelt hält (nicht immer) besser

    SecurityInsider: Doppelt hält (nicht immer) besser

    Zwei-Faktor-Authentifizierung (2FA) hat sich als die Lösung für Online-Banking, E-Commerce-Seiten und Social-Media-Plattformen etabliert. Absolute Sicherheit ist damit jedoch nicht garantiert.

    Read Post
  • Rabatte auf Drogen, Knarren und Kreditkarten

    Rabatte auf Drogen, Knarren und Kreditkarten

    Seit Freitag liefern sich Online- und Einzelhandel gegenseitig eine Rabattschlacht. Doch Black Friday und Cyber Monday sind auch in den dunkleren Teilen des Internets beliebt.

    Read Post
  • Sogar im Darknet gibt es Black-Friday-Deals

    Sogar im Darknet gibt es Black-Friday-Deals

    Cyberkriminelle zelebrieren den Konsum-Feiertag sogar in der Netz-Unterwelt. «Wir sehen auf dem Schwarzmarkt momentan die gleichen Strategien, welche auch Online-Händler zum Black Friday anwenden», so

    Read Post
  • Black Friday: Großes Geschäft für Cyberkriminelle, Gefahr für Einzelhändler

    Black Friday: Großes Geschäft für Cyberkriminelle, Gefahr für Einzelhändler

    Menschen sind immer auf der Suche nach einem Schnäppchen – das gilt für die Verbraucher genauso wie für Cyberkriminelle. Am Black Friday und Cyber Monday lockt auch das Dark Web mit Sonderangeboten fü

    Read Post
  • Live Webinar with the FBI Cyber Division: Your Data at Risk – Emerging Cyber Threats to Your Enterprise

    Live Webinar with the FBI Cyber Division: Your Data at Risk – Emerging Cyber Threats to Your Enterprise

    Join FBI Special Agent and Senior Cyber and Counterintelligence SME, Darren Mott, for this live webinar to learn of emerging threat to your data and best practices to avoid becoming a victim.

    Read Post
  • The CyberWire Daily Podcast: Too Much Information: The Sequel

    The CyberWire Daily Podcast: Too Much Information: The Sequel

    Tamika Smith speaks with Harrison Van Riper from Digital Shadows aboutour recent report, “Too Much Information: The Sequel,” outlining the increase in data exposure over the past year.

    Read Post
  • Live Webinar July 18: Harnessing Exposed Data to Enhance Cyber Intelligence

    Live Webinar July 18: Harnessing Exposed Data to Enhance Cyber Intelligence

    Understanding how breached data is used, whether it be to create synthetic identities, take over bank accounts or perpetrate credit card fraud, to name a few, can play a big role in threat intel.

    Read Post
  • Live Webinar June 27: Best Practices Mitigating Risks to Data in Complex IT Ecosystems

    Live Webinar June 27: Best Practices Mitigating Risks to Data in Complex IT Ecosystems

    Learn how complex enterprises rely on third party systems, networks and service providers and the associated steps they take to protect data.

    Read Post
  • Weekly Intelligence Summary: Ep 16

    Weekly Intelligence Summary: Ep 16

    Jamie and Alex are back with Harrison this week to talk about the leak of information related to APT34 on Telegram, including victim data, personally identifiable information and the group's...

    Read Post
  • Weekly Intelligence Summary: Ep 7

    Weekly Intelligence Summary: Ep 7

    This week, Phil and Alex join Harrison to discuss a new malware delivery technique using the Outlook preview panel. Also, threat actor Gnosticplayers was offering large data sets for sale on Dream...

    Read Post
  • Episode 58: A Tale of Epic Extortions

    Episode 58: A Tale of Epic Extortions

    The Photon Research Team’s Rafael Amado, Richard Gold and Harrison Van Riper get together to discuss Digital Shadows’ latest research report, A Tale of Epic Extortions: How Cybercriminals Monetize...

    Read Post
  • Digital Shadows Integrations

    Digital Shadows Integrations

    SearchLight™ service integrates with the industry’s leading technology partners. Together, we provide customers end-to-end threat protection, greater insight into security events, and streamlined i...

    Read Post
  • loading
    Loading More...