Digital Shadows Blogs

Manage Your Digital Risk

  • FBI IC3: Cybercrime Surges in 2018, Causing $2.7 Billion in Losses

    FBI IC3: Cybercrime Surges in 2018, Causing $2.7 Billion in Losses

    This week, the Federal Bureau of Investigation released its 2018 Internet Crime Complaints Center (IC3). In 2018, the IC3 responded ...

    Read Post
  • ShadowTalk Update – 4.15.19

    ShadowTalk Update – 4.15.19

    Christian and Jamie join Harrison for another week of ShadowTalk to discuss the FIN6 threat actor reportedly widening its range ...

    Read Post
  • Reducing your attack surface

    Reducing your attack surface

    What is an attack surface According to OWASP, an attack surface “describes all of the different points where an attacker could ...

    Read Post
  • ShadowTalk Update – 4.8.19

    ShadowTalk Update – 4.8.19

    Jamie, Alex and Zuko sit down with Harrison to talk about a story that flew a little under the radar ...

    Read Post
  • Easing into the extortion game

    Easing into the extortion game

    One of the main ideas which flowed through Photon’s most recent research report, A Tale of Epic Extortions, was that cyber ...

    Read Post
  • Predator: Modeling the attacker’s mindset

    Predator: Modeling the attacker’s mindset

    Author: Richard Gold  The phrases “attacker’s mindset” or “think like an attacker” are often used in cyber security to encourage ...

    Read Post
  • Making Some Noise in the Channel

    Making Some Noise in the Channel

    Digital Shadows Channel REV Partner Program shifts into 5th gear and earns the CRN 5-Star Partner Program Guide Award It’s ...

    Read Post
  • ShadowTalk Update – 4.1.19

    ShadowTalk Update – 4.1.19

    Christian and Jamie sit down with Harrison to talk about the compromised Asus server used to distribute backdoor malware to ...

    Read Post
  • Cyber Risks and High-frequency Trading: Conversation with an Insider

    Cyber Risks and High-frequency Trading: Conversation with an Insider

    Research from the Carnegie Endowment for International Peace published this week focused the attention on how financial systems around the ...

    Read Post
  • Live Webinar: Best Practices for Protecting Your Brand Online

    Live Webinar: Best Practices for Protecting Your Brand Online

    Are you equipped to combat online counterfeiting, trademark infringement, fake social media sites, fraudulent websites, fake mobile apps, and more? Join this live webinar to protect your brand online.

    Read Post
  • ShadowTalk Update – 3.25.19

    ShadowTalk Update – 3.25.19

    Harrison chats with Jamie and Alex this week on an attack on Norwegian aluminum and renewable-energy company Norsk Hydro ASA. ...

    Read Post
  • Dark Web Typosquatting: Scammers v. Tor

    Dark Web Typosquatting: Scammers v. Tor

    Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can ...

    Read Post
  • How to Secure Your Online Brand

    How to Secure Your Online Brand

    What is online brand security? As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand ...

    Read Post
  • ShadowTalk Update – 3.18.19

    ShadowTalk Update – 3.18.19

    Harrison sits down with Rose and Christian for a quick chat about APT40 targeting educational maritime research, as well as ...

    Read Post
  • Detecting Exposed Company Data: The What, Why, and How

    Detecting Exposed Company Data: The What, Why, and How

    What is data loss detection? A fundamental responsibility for any IT security professional is to secure their information assets, be ...

    Read Post
  • ShadowTalk Update – 3.11.19

    ShadowTalk Update – 3.11.19

    This week Jamie and Alex join Harrison to look at Fin6, who has begun regularly targeting card-not-present data on e-commerce ...

    Read Post
  • Purple Teaming with Vectr, Cobalt Strike, and MITRE ATT&CK™

    Purple Teaming with Vectr, Cobalt Strike, and MITRE ATT&CK™

    Authors: Simon Hall, Isidoros Monogioudis   Here at Digital Shadows we perform regular purple team exercises to continually challenge and ...

    Read Post
  • ShadowTalk Update – 3.04.19

    ShadowTalk Update – 3.04.19

    This week Rose and Phil join Harrison to discuss a three-stage cryptocurrency mining attack using Mimikatz and Radmin in tandem. ...

    Read Post
  • Don’t Take Our Word for It: See for Yourself Why Forrester Named SearchLight a Leader….For Free!

    Don’t Take Our Word for It: See for Yourself Why Forrester Named SearchLight a Leader….For Free!

    Every day cyber security professionals are bombarded with marketing messages from 3,000+ security vendors. It’s a cacophony of catchy tag ...

    Read Post
  • SamSam But Different: MITRE ATT&CK and the SamSam Group Indictment

    SamSam But Different: MITRE ATT&CK and the SamSam Group Indictment

    In our latest research report, A Tale of Epic Extortions, the Digital Shadows Photon Research Team highlight how cybercriminals abuse our ...

    Read Post
  • loading
    Loading More...