Digital Shadows Blogs

Manage Your Digital Risk

  • ShadowTalk Update – 17.10.2018

    ShadowTalk Update – 17.10.2018

    Following from our recent research, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, the ...

    Read Post
  • Bomb Threat Emails: Extortion Gets Physical

    Bomb Threat Emails: Extortion Gets Physical

    Digital Shadows has been able to analyse a series of these bomb threat emails. In this blog, we provide six things we know so far.

    Read Post
  • Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    We cover a range of the different techniques attackers of all persuasions (whether sophisticated nation state or low-level hacker) choose when performing their phishing campaigns.

    Read Post
  • Digital Shadows New Integration for Splunk

    Digital Shadows New Integration for Splunk

    Today we announced the release of an updated version of our Splunk App, which is now certified for both Splunk ...

    Read Post
  • ShadowTalk Update – 12.10.2018

    ShadowTalk Update – 12.10.2018

    In this week’s ShadowTalk, Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott ...

    Read Post
  • Using Shadow Search to Power Investigations: Sextortion Campaigns

    Using Shadow Search to Power Investigations: Sextortion Campaigns

    We recently wrote about sextortion campaigns and how they’ve developed their lures over time. As a result of these campaigns, ...

    Read Post
  • Gartner Peer Insights Review of Digital Shadows

    Gartner Peer Insights Review of Digital Shadows

    Don't take our word for it - hear from your peers. Senior Network Security Engineer gives his take on Digital Shadows.

    Read Post
  • 2019 Cyber Security Forecasts: Six Things on the Horizon

    2019 Cyber Security Forecasts: Six Things on the Horizon

    For this blog, we looked at trends and events that have shaped the digital risk landscape this year and how they might play out in 2019.

    Read Post
  • Live Webinar: Surging Cyber Threats to Watch in 2019

    Live Webinar: Surging Cyber Threats to Watch in 2019

    Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019.

    Read Post
  • ShadowTalk Update – 12.03.2018

    ShadowTalk Update – 12.03.2018

    Michael Marriott, Dr Richard Gold and Simon Hall discuss our recent findings on threat actors using cracked versions of Cobalt ...

    Read Post
  • ShadowTalk Update – 12.03.2018

    ShadowTalk Update – 12.03.2018

    Michael Marriott, Dr Richard Gold and Simon Hall discuss our recent findings on threat actors using cracked versions of Cobalt ...

    Read Post
  • Threat Actors Use of Cobalt Strike: Why Defense is Offense’s Child

    Threat Actors Use of Cobalt Strike: Why Defense is Offense’s Child

    I’m a big fan of the Cobalt Strike threat emulation software. Here at Digital Shadows, it’s a staple of our ...

    Read Post
  • Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework

    Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework

    Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it calls the “Essential 8”: a set ...

    Read Post
  • Live Webinar: How to Leverage Threat Intelligence to Protect Against Digital Risks

    Live Webinar: How to Leverage Threat Intelligence to Protect Against Digital Risks

    Learn how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context about the threat, and remediate.

    Read Post
  • ShadowTalk Update – 11.26.2018

    ShadowTalk Update – 11.26.2018

    With Black Friday kicking off the holiday spending season, Harrison Van Riper, Jamie Collier, and Rafael Amado focus on cyber ...

    Read Post
  • Black Friday and Cybercrime: Retail’s Frankenstein Monster

    Black Friday and Cybercrime: Retail’s Frankenstein Monster

    With every year that passes, Black Friday seems to morph into a creation its original proponents could not have even ...

    Read Post
  • Sextortion 2.0: A New Lure

    Sextortion 2.0: A New Lure

    Back in September we released a blog about the large volume of sextortion email campaigns that were hitting people’s inboxes. ...

    Read Post
  • Live Webinar: 2019 Risk Trends Predictions

    Live Webinar: 2019 Risk Trends Predictions

    In this can’t miss webinar, our panel of industry experts will recap 2018 and offer their views on what to expect in 2019 and beyond.

    Read Post
  • Live Webinar: The Need for Digital Risk Protection

    Live Webinar: The Need for Digital Risk Protection

    Join us for an informative session on the different types of digital risks that exist externally and how you can prevent them.

    Read Post
  • ShadowTalk Update – 11.19.2018

    ShadowTalk Update – 11.19.2018

    Leaked court documents surfaced this week detailing how Italian authorities tried and ultimately failed to identify and convict the vigilante ...

    Read Post
  • loading
    Loading More...