Home » Digital Shadows Blogs » Live Webinar July 18: Harnessing Exposed Data to Enhance Cyber Intelligence
ShadowTalk Update – Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity
This week Alex and Jamie chat with Harrison on a cyber-threat campaign involving the abuse of legitimate fe...
Error - something went wrong!
Most Recent Articles
SANS Cyber Threat Intelligence Summit 2020: A Recap
Last week I attended the eighth annual SANS Cyber Threat Intelligence Summit in Crystal City, Virginia. I want to ...
ShadowTalk Update – Citrix Vulnerability, Microsoft Data Breach, and Telnet Credentials Published
Following on from last week, Citrix released a first set of patches to fix a vulnerability (CVE-2019 -19781) affecting the ...
How Digital Shadows Helped Find and Remediate an Exposed Admin Password on Github
I often get asked to share examples of the types of alerts we send to clients. I work on ...
Inside Digital Shadows: Davitt Potter Joins as Director of MSSP and Channels in the Americas
I’ve recently had the opportunity to join Digital Shadows, who have built an amazing offering in the digital risk protection and threat intelligence space.
heise BrandWorld | Microsoft 365: Sensible Informationen schützen mit Azure Information Protection
Mit Tools wie Azure Information Protection macht Microsoft es Unternehmen einfacher, grundlegende Sicherheitsprinzipien einzuhalten.
How the Cybercriminal Underground Mirrors the Real World
In many cases the cybercriminal underground is a lot more familiar than you might be led to believe...
ShadowTalk Update – NSA Vulnerability Disclosure, Ransomware News, and Iran Updates
Kacey, Charles, Alex, and Harrison host this week’s threat intelligence update from Dallas. We kick off with vulnerabilities from the ...
Third Party Risk: 4 ways to manage your security ecosystem
The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can ...
Taz | Big Brother hilft Microsoft
Ein US-amerikanischer Geheimdienst findet eine Windows-Sicherheitslücke und informiert Microsoft. Das könnte Teil einer neuen Strategie sein.
NSA Vulnerability Disclosure: Pros and Cons
On Monday, January 13th, Brian Krebs reported that Microsoft would be releasing “a software update on Tuesday to fix ...
CVE-2019-19781: Analyzing the Exploit
On December 17th 2019, CVE-2019-19781 was disclosed. The vulnerability allows for directory traversal and remote code execution on Citrix ...
Cryptonite: Ransomware’s answer to Superman…
A new ransomware-as-a-service (RaaS) platform called Cryptonite plans to not only bring ransomware to the masses, but has the added benefit of reportedly being fully undetectable, requiring minimal...
Iran and the United States – start of the long war or return to normal?
There are useful precedents that can assist when we consider how this will unfold in the near-term future.
ShadowTalk Update – Iranian Cyber Threats, Travelex Ransomware Attack, and Exploit Forum updates
Viktoria hosts this week and introduces the episode bringing Sammy on to provide some regional insight and context around the Iranian cyber threat and discusses whether a cyber response is likely.
Iranian APT Groups’ Tradecraft Styles: Using Mitre ATT&CK™ and the ASD Essential 8
We will use the Essential 8 as part of our toolkit in thinking about how to mitigate against the TTPs used by these APT groups.
Iran and Soleimani: Monitoring the Situation
We focus on the cyber-related fallout from the situation, and ways that they may or may not impact our clients. We will continue to update this blog as related events unfold.
Iranian Cyber Threats: Practical Advice for Security Professionals
Unless you went very dark for an extended holiday break, you are no doubt very well aware of the United ...
ShadowTalk Update – Jingle Bell Ryuk: NOLA Ransomware, Ring Doorbells, and 2020 Predictions
CISO Rick Holland joins our ShadowTalk hosts (Viktoria, Alex, and Harrison) for our holiday special! This week the team covers: ...
Top Security Blogs of 2019 from Digital Shadows
As we approach the end of 2019, we wanted to share some of the most popular security trends and blogs from this year that we saw on our blog.
The Closure of Market.ms: A Cybercriminal Marketplace Ahead of Its Time