Digital Shadows Blogs

Manage Your Digital Risk

  • Managing Infosec Burnout: The Hidden Perpetrator

    Managing Infosec Burnout: The Hidden Perpetrator

    As we come to focus our efforts in combating Infosec burnout, we have got to ensure we are aiming in the right direction.

    Read Post
  • ShadowTalk Update – “HiddenWasp” and “BlackSquid” malware, TA505 and Turla actvity, and Too Much Information:The Sequel

    ShadowTalk Update – “HiddenWasp” and “BlackSquid” malware, TA505 and Turla actvity, and Too Much Information:The Sequel

    Alex and Christian join HVR this week to discuss the Linux malware “HiddenWasp” (along with HVR’s hatred of the insect), ...

    Read Post
  • 2.3 billion files exposed across online file storage technologies

    2.3 billion files exposed across online file storage technologies

    Currently 2.3 billion files are being made publicly available by misconfigured and non-secured technologies used to store this data such as Amazon S3 buckets, Server Message Block (SMB), File Transfer

    Read Post
  • BlueKeep: Cutting through the hype to prepare your organization

    BlueKeep: Cutting through the hype to prepare your organization

    Over the last week we have all been tuning into our news feeds and listening to the security folks chatting about the next super vulnerability, CVE-2019-0708. There’s no shortage of coverage over the

    Read Post
  • Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser

    Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser

    Phishing remains one of the most pervasive threats to enterprise, the simple but effective technique of tricking unassuming users into ...

    Read Post
  • Partnering with SecureLink to help organizations minimize their digital risk

    Partnering with SecureLink to help organizations minimize their digital risk

    Today we announced that SecureLink, one of Europe’s most respected independent cybersecurity and managed service providers, has partnered with Digital ...

    Read Post
  • Mapping Iran’s Rana Institute to MITRE Pre-ATT&CK™ and ATT&CK™

    Mapping Iran’s Rana Institute to MITRE Pre-ATT&CK™ and ATT&CK™

    The internet has been aflame with discussions around three leaks of internal information from APT groups attributed with the Islamic ...

    Read Post
  • Cyber Talent Gap: How to Do More With Less

    Cyber Talent Gap: How to Do More With Less

    The challenge facing us today is twofold: not only is the digital footprint of the organizations we want to protect ...

    Read Post
  • ShadowTalk Update – 5.06.19

    ShadowTalk Update – 5.06.19

    Kacey and Alex join HVR this week to talk through the key stories this week including a new threat group ...

    Read Post
  • Live Webinar: Strategies to Solve the Cyber Talent Gap and Protect Your IT Infrastructure

    Live Webinar: Strategies to Solve the Cyber Talent Gap and Protect Your IT Infrastructure

    During this informative session, you’ll learn from Marc Crudgington, CISO at Woodforest Bank, about the innovative programs he’s put in place to protect his IT infrastructure with a limited staff.

    Read Post
  • Enabling Soi Dog’s Digital Transformation: A Case Study

    Enabling Soi Dog’s Digital Transformation: A Case Study

    At the beginning of this year I was introduced to Spencer Hardy, the IT manager for an animal charity called ...

    Read Post
  • Announcing Digital Shadows’ ISO27001 certification

    Announcing Digital Shadows’ ISO27001 certification

    I’m pleased to announce that Digital Shadows has recently achieved an important compliance milestone for our customers. After a concerted ...

    Read Post
  • ShadowTalk Update – 5.06.19

    ShadowTalk Update – 5.06.19

    Phil and newcomer Benjamin Newman join Harrison for another edition of the Weekly Intelligence Summary. The guys cover two distinct ...

    Read Post
  • ShadowTalk Update – 4.29.19

    ShadowTalk Update – 4.29.19

    Jamie and Alex are back with Harrison this week to talk about the leak of information related to APT34 on ...

    Read Post
  • FBI IC3: Cybercrime Surges in 2018, Causing $2.7 Billion in Losses

    FBI IC3: Cybercrime Surges in 2018, Causing $2.7 Billion in Losses

    This week, the Federal Bureau of Investigation released its 2018 Internet Crime Complaints Center (IC3). In 2018, the IC3 responded ...

    Read Post
  • ShadowTalk Update – 4.22.19

    ShadowTalk Update – 4.22.19

    This week the team discusses an unidentified threat actor that has obtained data from various personal Outlook, MSN, and Hotmail ...

    Read Post
  • ShadowTalk Update – 4.15.19

    ShadowTalk Update – 4.15.19

    Christian and Jamie join Harrison for another week of ShadowTalk to discuss the FIN6 threat actor reportedly widening its range ...

    Read Post
  • Reducing Your Attack Surface

    Reducing Your Attack Surface

    What is an attack surface According to OWASP, an attack surface “describes all of the different points where an attacker could ...

    Read Post
  • ShadowTalk Update – 4.8.19

    ShadowTalk Update – 4.8.19

    Jamie, Alex and Zuko sit down with Harrison to talk about a story that flew a little under the radar ...

    Read Post
  • Easing into the extortion game

    Easing into the extortion game

    One of the main ideas which flowed through Photon’s most recent research report, A Tale of Epic Extortions, was that cyber ...

    Read Post
  • loading
    Loading More...