Triage effortlessly with superior classification and automated actions with domain alerts.

Threat Intel Fan?
Sign up below to get our TI updates delivered to your inbox!
Other content in this Stream

This guide outlines what potential data sources, detection methods, context, and remediation actions to consider if you want to effectively monitor domains and mitigate the risk of data loss, exposed
Discover attackers impersonating your domains, social accounts, people, and mobile applications.

This webinar covers the latest research into impersonating domains and provides a demo of SearchLight’s industry-leading domain monitoring capabilities.

This blog will outline the top threats to brands we see online, and some of the best practices for protecting them.
In this report, Digital Shadows’ Photon Team analyzed a data set of more than 175,000 impersonating domains raised to our clients over four months of 2021.

In this webinar, Jamie Collier at Digital Shadows and Rami Refaat at Spire Solutions walk through brand protection.
This infographic details the two high level types of domain impersonation: typosquats and combosquats, and the 10 different strategies used by threat actors.

Recently, we’ve released a few articles on typosquatting, Getting Started with Domain Monitoring.

What is online brand security? As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand ...

This Solutions Guide to learn how to protect your organizations social footprint with the top Social Media Monitoring use cases Digital Shadows has identified.