Shadow Talk Update – 05.07.2018
In this week’s episode Shadow Talk, it’s a vulnerability extravaganza. We cover malicious use of legitimate...
Error - something went wrong!
Most Recent Articles
ShadowTalk Update – Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity
This week Alex and Jamie chat with Harrison on a cyber-threat campaign involving the abuse of legitimate features in Google ...
Live Webinar July 18: Harnessing Exposed Data to Enhance Cyber Intelligence
Understanding how breached data is used, whether it be to create synthetic identities, take over bank accounts or perpetrate credit card fraud, to name a few, can play a big role in threat intel.
Live Webinar June 27: Best Practices Mitigating Risks to Data in Complex IT Ecosystems
Learn how complex enterprises rely on third party systems, networks and service providers and the associated steps they take to protect data.
Leaky SMB File Shares – So Many Bytes!
Everyone loves a sequel. If you’re an avid Marvel fan, you’re probably sitting on the edge of your seat waiting ...
Managing Digital Risk: 4 Steps to Take
In this blog, we walk you through the emergence of digital risks and key steps you can take to help your organization to securely achieve the benefits of digital transformation.
ShadowTalk Update – XMRig Cryptocurrency Mining, FIN8 Backdoor, and Attacks Against Office 365
This week Harrison is joined by Travis and Alec to discuss the security stories of the week including a fileless malware ...
Managing Infosec Burnout: The Hidden Perpetrator
As we come to focus our efforts in combating Infosec burnout, we have got to ensure we are aiming in the right direction.
ShadowTalk Update – “HiddenWasp” and “BlackSquid” malware, TA505 and Turla actvity, and Too Much Information:The Sequel
Alex and Christian join HVR this week to discuss the Linux malware “HiddenWasp” (along with HVR’s hatred of the insect), ...
2.3 billion files exposed across online file storage technologies
Currently 2.3 billion files are being made publicly available by misconfigured and non-secured technologies used to store this data such as Amazon S3 buckets, Server Message Block (SMB), File Transfer
BlueKeep: Cutting through the hype to prepare your organization
Over the last week we have all been tuning into our news feeds and listening to the security folks chatting about the next super vulnerability, CVE-2019-0708. There’s no shortage of coverage over the
Automating 2FA phishing and post-phishing looting with Muraena and Necrobrowser
Phishing remains one of the most pervasive threats to enterprise, the simple but effective technique of tricking unassuming users into ...
Partnering with SecureLink to help organizations minimize their digital risk
Today we announced that SecureLink, one of Europe’s most respected independent cybersecurity and managed service providers, has partnered with Digital ...
Mapping Iran’s Rana Institute to MITRE Pre-ATT&CK™ and ATT&CK™
The internet has been aflame with discussions around three leaks of internal information from APT groups attributed with the Islamic ...
Cyber Talent Gap: How to Do More With Less
The challenge facing us today is twofold: not only is the digital footprint of the organizations we want to protect ...
ShadowTalk Update – 5.06.19
Kacey and Alex join HVR this week to talk through the key stories this week including a new threat group ...
Live Webinar: Strategies to Solve the Cyber Talent Gap and Protect Your IT Infrastructure
During this informative session, you’ll learn from Marc Crudgington, CISO at Woodforest Bank, about the innovative programs he’s put in place to protect his IT infrastructure with a limited staff.
Enabling Soi Dog’s Digital Transformation: A Case Study
At the beginning of this year I was introduced to Spencer Hardy, the IT manager for an animal charity called ...
Announcing Digital Shadows’ ISO27001 certification
I’m pleased to announce that Digital Shadows has recently achieved an important compliance milestone for our customers. After a concerted ...
ShadowTalk Update – 5.06.19
Phil and newcomer Benjamin Newman join Harrison for another edition of the Weekly Intelligence Summary. The guys cover two distinct ...
ShadowTalk Update – 4.29.19