-
Recruitment Fraud in 2022
Earlier this month, the FBI released a public service announcement titled “Scammers Exploit Security Weaknesses on Job Recruitment Websites to ...
-
Vulnerability Intelligence: A Best Practice Guide
Vulnerability intelligence is fast emerging as one of the most valued threat intelligence use cases. It provides information about how ...
-
Cyber Threats to Government
Exploring cyber threats to Government and Public bodies, including ransomware targets and initial access listings
-
Managing your External Attack Surface with SearchLight
Recently we have been hearing plenty about External Attack Surface Management (EASM). While Digital Shadows focuses on digital risk protection ...
-
What Is Intellectual Property Protection?
Growing costs of intellectual property theft Intellectual property theft is defined by the FBI as “robbing people or companies of ...
-
What is Third Party Risk?
Third party risk is the process of managing risks introduced by suppliers and third parties, often specifically to sensitive data and customer information.
-
Data Leakage Detection Best Practices
This blog provides an overview of our recently-published Data Leakage Detection Solutions guide, which provides best practices and free tools ...
-
Enhance Executive Protection with SocialMonitor
Today we’re announcing the release of SocialMonitor, an industry-leading capability to better protect executives from social media impersonation. Read on ...
-
Protecting Against Ransomware: What Role Does Threat Intelligence Play?
Ransomware actors are thriving at the moment: there is barely a day that goes by without the announcement of a ...
-
Social Media Monitoring Best Practices
This blog is drawn from the Digital Shadows’ Social Media Monitoring Solutions Guide, which provides best practices for security teams ...
-
Understanding Smishing Attacks
I’ve got some good news and some bad news. The bad news is that I’ve been receiving a lot of ...
-
Getting Started With Domain Monitoring Part 3: Remediation
This blog is taken from our recent Domain Monitoring Solutions Guide, which provides best practices and free tools to begin ...
-
Getting Started with Domain Monitoring Part 2: Detection
This blog is taken from our recent Domain Monitoring Solutions Guide, which provides best practices and free tools to begin ...
-
Getting Started with Domain Monitoring: Part 1, Collection
This blog is taken from our recent Domain Monitoring Solutions Guide, which provides best practices and free tools to begin ...
-
Key Findings from our Dark Web Monitoring Webinar
A few weeks ago, we hosted a webinar on Dark Web Monitoring. I was taken aback that, even a year ...
-
Cyber Threats to the Online Gaming Industry
Last week, Motherboard reported that source code for FIFA 21 had been stolen from EA sports by hackers. This was ...
-
The Top Three Cybercrime Takeaways from the 2021 Verizon DBIR
The 2021 DBIR is still hot off the press, and it did not disappoint. For many years, Verizon’s Data Breach ...
-
The Technology Adoption Lifecycle of Genesis Market
This blog highlights work from Digital Shadows’ recently-published Dark Web Monitoring Solutions Guide. The guide outlines some of the most ...
-
Tracking Ransomware within SearchLight
“If it ain’t broke, don’t fix it”. As we predicted last year, ransomware has been one of the most successful ...
-
3 Reasons to Download our New Cyber Threat Intelligence Solutions Guide
This blog outlines what you can expect to read in our newly-released Cyber Threat Intelligence: Solutions Guide and Best Practices. ...
-
Loading More...