Digital Shadows Blogs

Manage Your Digital Risk

  • Five Threats to Financial Services: Part Five, Hacktivism

    Five Threats to Financial Services: Part Five, Hacktivism

    OK, so it’s not a sexy as insider threats, banking trojans, phishing campaigns or payment card fraud, but hacktivism is ...

    Read Post
  • Five Threats to Financial Services: Part Four, Payment Card Fraud

    Five Threats to Financial Services: Part Four, Payment Card Fraud

    Payment card information is the lifeblood of the cybercriminal ecosystem. In previous blogs in this series, we’ve focused on how ...

    Read Post
  • ShadowTalk Update – 08.13.2018

    ShadowTalk Update – 08.13.2018

    In this week’s ShadowTalk it’s all things phishing. Rose Bernard and Simon Hall join Rafael Amado to discuss the recent ...

    Read Post
  • Digital Shadows Contributes to Insider Threat Research

    Digital Shadows Contributes to Insider Threat Research

    On July 30, Forrester published its latest research report on malicious insiders, Defend Your Data As Insiders Monetize Their Access. ...

    Read Post
  • Five Threats to Financial Services: Phishing Campaigns

    Five Threats to Financial Services: Phishing Campaigns

    In our last blog, we highlighted how banking trojans are a threat to banking customers and small businesses, normally delivered ...

    Read Post
  • ShadowTalk Update – 08.06.2018

    ShadowTalk Update – 08.06.2018

    In this week’s episode, JP Perez-Etchegoyen, CTO of Onapsis, joins Michael Marriott to talk about the exposure of SAP and ...

    Read Post
  • FIN7: Arrests and Developments

    FIN7: Arrests and Developments

    Three alleged members of FIN7 arrested On August 1st, 2018, the US Department of Justice filed criminal charges against three ...

    Read Post
  • Diversity of Thoughts in the Workplace: Are You Thinking What I’m Thinking?

    Diversity of Thoughts in the Workplace: Are You Thinking What I’m Thinking?

    In my most recent blog post I discussed Digital Shadows’ Women’s Network and how it is helping us shape wider ...

    Read Post
  • Security Spotlight Series: Dr. Richard Gold

    Security Spotlight Series: Dr. Richard Gold

    Organizations rely on Digital Shadows to be an extension of their security team. Our global team provide the latest tooling, ...

    Read Post
  • ShadowTalk Update – 07.30.2018

    ShadowTalk Update – 07.30.2018

    Richard Gold and Rose Bernard join Michael Marriott to talked about updates to the Satori botnet, which has expanded to ...

    Read Post
  • Black Hat USA 2018

    Black Hat USA 2018

    Black Hat USA 2018 is quickly approaching! The conference, one of the world’s leading Information Security events, focuses on the ...

    Read Post
  • Cyber Threats to ERP Applications: Threat Landscape

    Cyber Threats to ERP Applications: Threat Landscape

    What are ERP Applications? Organizations rely on Enterprise Resource Planning (ERP) applications to support business processes. This includes payroll, treasury, ...

    Read Post
  • ShadowTalk Update – 07.23.2018

    ShadowTalk Update – 07.23.2018

    In this week’s ShadowTalk, we discuss the Robert Mueller indictment against 12 Russian individuals for alleged US election interference. However, ...

    Read Post
  • Five Threats to Financial Services: Part Two, Banking Trojans

    Five Threats to Financial Services: Part Two, Banking Trojans

    A couple of weeks ago, we learned about a new phishing campaign that delivered Trickbot in an attempt to harvest ...

    Read Post
  • Mitre ATT&CK™ and the Mueller GRU Indictment: Lessons for Organizations

    Mitre ATT&CK™ and the Mueller GRU Indictment: Lessons for Organizations

    A recent indictment revealed how the GRU (Russia’s Military Intelligence agency) used both influence operations and network intrusions to achieve ...

    Read Post
  • Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    “Digital Shadows leads the pack for digital risk protection providers.” Digital Shadows’ customers have been telling us this for years, ...

    Read Post
  • ShadowTalk Update – 07.16.2018

    ShadowTalk Update – 07.16.2018

    In this week’s ShadowTalk, Digital Shadows’ Russian-speaking security specialist discovered files and source code allegedly related to the Carbanak organized ...

    Read Post
  • Alleged Carbanak Files and Source Code Leaked: Digital Shadows’ Initial Findings

    Alleged Carbanak Files and Source Code Leaked: Digital Shadows’ Initial Findings

    Digital Shadows’ Russian-linguists discovered a post from 6 July 2018 on exploit[.]in that provided files and source code that were ...

    Read Post
  • Security Analyst Spotlight Series: Harrison Van Riper

    Security Analyst Spotlight Series: Harrison Van Riper

    Organizations rely on our cyber intelligence analysts to be an extension of their security team. Our global team of analysts provide relevant ...

    Read Post
  • ShadowTalk Update – 07.09.2018

    ShadowTalk Update – 07.09.2018

    In this week’s ShadowTalk, Richard Gold and Simon Hall join Rafael Amado to discuss SSL (Secure Sockets Layer) interception, a ...

    Read Post
  • loading
    Loading More...