Home » Digital Shadows Blogs » Live Webinar: Strategies to Solve the Cyber Talent Gap and Protect Your IT Infrastructure
ShadowTalk Update – 5.06.19
Kacey and Alex join HVR this week to talk through the key stories this week including a new threat group ...
Error - something went wrong!
Most Recent Articles
A Growing Enigma: New AVC on the Block
This week, in a ground breaking announcement, the Bank of England named Alan Turing the new face of the £50 ...
ShadowTalk Update – Marriott Faces GDPR Fines, TA505 Global Attacks, Zoom 0-Day, and New Magecart Activity
Kacey and Alex join Harrison to walk through this week’s threat intelligence stories. Alex walks us through the highlight story this ...
Harnessing Exposed Data to Enhance Cyber Intelligence
We will walk you through each stage of this exploited data cycle to illustrate the economy of exposed credentials, and then present ways you can protect and mitigate the threats targeting your organiz
Welcoming NAB Ventures & Scaling SearchLight for Growth
Today is an exciting day for Digital Shadows. Earlier this morning, we announced a $10m focused investment to scale our ...
Extortion, Sale, Reconnaissance, & Impersonation: 4 Ways Your Digital Footprint Enables Attackers
Whether it’s intellectual property, proprietary code, personal data, or financial information, the goal of information security is to protect those ...
The CyberWire Daily Podcast: Too Much Information: The Sequel
Tamika Smith speaks with Harrison Van Riper from Digital Shadows aboutour recent report, “Too Much Information: The Sequel,” outlining the increase in data exposure over the past year.
ShadowTalk Update – Operation Soft Cell, Libra Cryptocurrency Impersonations, and New Cyber Espionage Activity
This week Alex and Phil join Harrison to discuss Operation Soft Cell, a campaign that has been actively compromising telecommunications ...
Facebook’s Libra Cryptocurrency: Cybercriminals tipping the scales in their favor
Since Facebook’s announcement on June 18, there has been a gold rush, with people scrambling to register a myriad of domain permutations that infringe on the new trademarks. These have ranged from see
ShadowTalk Update – Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity
This week Alex and Jamie chat with Harrison on a cyber-threat campaign involving the abuse of legitimate features in Google ...
Live Webinar July 18: Harnessing Exposed Data to Enhance Cyber Intelligence
Understanding how breached data is used, whether it be to create synthetic identities, take over bank accounts or perpetrate credit card fraud, to name a few, can play a big role in threat intel.
Live Webinar June 27: Best Practices Mitigating Risks to Data in Complex IT Ecosystems
Learn how complex enterprises rely on third party systems, networks and service providers and the associated steps they take to protect data.
Leaky SMB File Shares – So Many Bytes!
Everyone loves a sequel. If you’re an avid Marvel fan, you’re probably sitting on the edge of your seat waiting ...
Managing Digital Risk: 4 Steps to Take
In this blog, we walk you through the emergence of digital risks and key steps you can take to help your organization to securely achieve the benefits of digital transformation.
ShadowTalk Update – XMRig Cryptocurrency Mining, FIN8 Backdoor, and Attacks Against Office 365
This week Harrison is joined by Travis and Alec to discuss the security stories of the week including a fileless malware ...
Managing Infosec Burnout: The Hidden Perpetrator
As we come to focus our efforts in combating Infosec burnout, we have got to ensure we are aiming in the right direction.
ShadowTalk Update – “HiddenWasp” and “BlackSquid” malware, TA505 and Turla actvity, and Too Much Information:The Sequel
Alex and Christian join HVR this week to discuss the Linux malware “HiddenWasp” (along with HVR’s hatred of the insect), ...
2.3 billion files exposed across online file storage technologies
Currently 2.3 billion files are being made publicly available by misconfigured and non-secured technologies used to store this data such as Amazon S3 buckets, Server Message Block (SMB), File Transfer
BlueKeep: Cutting through the hype to prepare your organization
Over the last week we have all been tuning into our news feeds and listening to the security folks chatting about the next super vulnerability, CVE-2019-0708. There’s no shortage of coverage over the
Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser
Phishing remains one of the most pervasive threats to enterprise, the simple but effective technique of tricking unassuming users into ...
Partnering with SecureLink to help organizations minimize their digital risk