Digital Shadows Blogs

Manage Your Digital Risk

  • The Nouns of Black Hat: People, Places, and Things From Summer Camp 2019

    The Nouns of Black Hat: People, Places, and Things From Summer Camp 2019

    Black Hat and DEFCON are a wrap! Digital Shadows was there in a big way this year and it was ...

    Read Post
  • Black Hat and DEFCON 2019 – Some of our Favorite Sessions

    Black Hat and DEFCON 2019 – Some of our Favorite Sessions

    The team were fortunate to go to Black Hat and DEFCON this year, and we wanted to share back some ...

    Read Post
  • ShadowTalk Update – Nightmare Market in Disarray and SEC Investigation into Data Leak at First American Financial Corp

    ShadowTalk Update – Nightmare Market in Disarray and SEC Investigation into Data Leak at First American Financial Corp

    Harrison is back! Alex and Christian join this week to discuss how Black Hat and DEFCON went last week, analyze ...

    Read Post
  • Fresh blow for dark web markets: Nightmare market in disarray

    Fresh blow for dark web markets: Nightmare market in disarray

    Over the past three weeks, Digital Shadows has observed another popular dark web criminal market – Nightmare – experience several ...

    Read Post
  • Live Webinar with the FBI Cyber Division: Your Data at Risk – Emerging Cyber Threats to Your Enterprise

    Live Webinar with the FBI Cyber Division: Your Data at Risk – Emerging Cyber Threats to Your Enterprise

    Join FBI Special Agent and Senior Cyber and Counterintelligence SME, Darren Mott, for this live webinar to learn of emerging threat to your data and best practices to avoid becoming a victim.

    Read Post
  • Recon Village: Panning for gold

    Recon Village: Panning for gold

    Richard will be presenting ‘Asset Discovery: Making Sense of the Ocean of OSINT’ at 13.50 on 9th August 2019 in ...

    Read Post
  • Capital One Breach: What we know and what you can do

    Capital One Breach: What we know and what you can do

    Monday blues. It’s a thing. It’s when you start the week feeling moody because your weekend is over. The feeling ...

    Read Post
  • The Account Takeover Kill Chain: A Five Step Analysis

    The Account Takeover Kill Chain: A Five Step Analysis

    Here, we review account takeover from the perspective of the cybercriminal: why and how do cybercriminals perform ATO?

    Read Post
  • ShadowTalk Update – More BlueKeep updates, FSB contractor hacked, and the Enigma Market

    ShadowTalk Update – More BlueKeep updates, FSB contractor hacked, and the Enigma Market

    Christian and Travis sit down with Harrison to discuss even more BlueKeep updates since last week, as a technical presentation gets uploaded to ...

    Read Post
  • Surviving and Thriving at Blackhat and DEF CON Summer Camp 2019

    Surviving and Thriving at Blackhat and DEF CON Summer Camp 2019

    With BSides, Black Hat and DEF CON (aka Security Summer Camp) fast approaching, I thought I’d do a quick blog ...

    Read Post
  • SearchLight’s Biggest Ever Update: New Ways to Discover, Contextualize, and Prioritize Digital Risks

    SearchLight’s Biggest Ever Update: New Ways to Discover, Contextualize, and Prioritize Digital Risks

    Since founding the company in 2011, we’ve had some memorable milestones: from the first release of SearchLight in 2014, to ...

    Read Post
  • A Growing Enigma: New AVC on the Block

    A Growing Enigma: New AVC on the Block

    This week, in a ground breaking announcement, the Bank of England named Alan Turing the new face of the £50 ...

    Read Post
  • ShadowTalk Update – Marriott Faces GDPR Fines, TA505 Global Attacks, Zoom 0-Day, and New Magecart Activity

    ShadowTalk Update – Marriott Faces GDPR Fines, TA505 Global Attacks, Zoom 0-Day, and New Magecart Activity

    Kacey and Alex join Harrison to walk through this week’s threat intelligence stories. Alex walks us through the highlight story this ...

    Read Post
  • Harnessing Exposed Data to Enhance Cyber Intelligence

    Harnessing Exposed Data to Enhance Cyber Intelligence

    We will walk you through each stage of this exploited data cycle to illustrate the economy of exposed credentials, and then present ways you can protect and mitigate the threats targeting your organiz

    Read Post
  • Welcoming NAB Ventures & Scaling SearchLight for Growth

    Welcoming NAB Ventures & Scaling SearchLight for Growth

    Today is an exciting day for Digital Shadows. Earlier this morning, we announced a $10m focused investment to scale our ...

    Read Post
  • Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers

    Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers

    Whether it’s intellectual property, proprietary code, personal data, or financial information, the goal of information security is to protect those ...

    Read Post
  • The CyberWire Daily Podcast: Too Much Information: The Sequel

    The CyberWire Daily Podcast: Too Much Information: The Sequel

    Tamika Smith speaks with Harrison Van Riper from Digital Shadows aboutour recent report, “Too Much Information: The Sequel,” outlining the increase in data exposure over the past year.

    Read Post
  • ShadowTalk Update – Operation Soft Cell, Libra Cryptocurrency Impersonations, and New Cyber Espionage Activity

    ShadowTalk Update – Operation Soft Cell, Libra Cryptocurrency Impersonations, and New Cyber Espionage Activity

    This week Alex and Phil join Harrison to discuss Operation Soft Cell, a campaign that has been actively compromising telecommunications ...

    Read Post
  • Facebook’s Libra Cryptocurrency: Cybercriminals tipping the scales in their favor

    Facebook’s Libra Cryptocurrency: Cybercriminals tipping the scales in their favor

    Since Facebook’s announcement on June 18, there has been a gold rush, with people scrambling to register a myriad of domain permutations that infringe on the new trademarks. These have ranged from see

    Read Post
  • ShadowTalk Update – Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity

    ShadowTalk Update – Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity

    This week Alex and Jamie chat with Harrison on a cyber-threat campaign involving the abuse of legitimate features in Google ...

    Read Post
  • loading
    Loading More...