Shadow Search speeds up the security operations process, quickly enabling deeper research and faster invest...
Want To Try Our Digital Risk Protection Tool?Get Started Free
Other content in this Stream
Weekly Intelligence Summary 14 Feb 2020
A recently discovered campaign has used the legitimate storage services of BitBucket to facilitate malware distribution and increase the perceived trust between an unknown threat actor and a targeted
yOurMine, Equifax Indictment, and SWIFT POC attack
Roses are red, violets are blue, here’s our threat intel podcast, just for you!
Applying the Analysis of Competing Hypotheses to the Cyber Domain
We define the strengths and weaknesses of ACH in the cyber-threat domain, with a "customer-centric" view that can aid analysts in presenting intelligence to a decision maker.
Weekly Intelligence Summary 07 Feb 2020
The recent disclosure of a vulnerability in Citrix devices was quickly followed by multiple exploitations before patches were introduced, reflecting the danger of announcing a critical vulnerability w
CTI Frameworks, Wawa Breach Updates, APT34, And Coronavirus Phishing Scams
January was a looooong year. Anyone else? In this week’s episode, Jamie starts by talking about his recent blog, Cyber Threat Intelligence Frameworks, with 5 rules for integrating these frameworks...
Red Team Blues: A 10 step security program for Windows Active Directory environments
Here at Digital Shadows we spend quite a bit of time attacking, defending and researching Windows AD environments, so we thought we’d chip in with a list of controls that we have found to give ...
How to Operationalize Threat Intelligence: Actionability and Context
Is there real value in threat intelligence? How can we leverage threat intelligence and make use of it in any meaningful way?
Dark web travel agencies: Take a trip on the dark side
This blog is intended to highlight the flourishing scene on criminal marketplaces for airline-related information.
Weekly Intelligence Summary 31 Jan 2020
The “Fractured Statue” cyber-threat campaign of 2019 has highlighted the difficulties in naming perpetrators based on overlapping tools and tactics. The campaign, carried out over four months and targ
SANS CTI Summit, Snake Ransomware, CacheOut, And Citrix Vuln Update [Podcast]
Rick Holland jumps in to kick-off this week’s episode to recap the 2020 SANS CTI Summit with Harrison. Then Harrison, Alex, Kacey, and Charles talk through other top stories of the week.
Competitions on Russian-language cybercriminal forums: Sharing expertise or threat actor showboating?
Competitions have been a feature of the Russian-language cybercriminal scene practically since the advent of cybercriminal forums ...
Cyber Threat Intelligence Frameworks: 5 Rules for Integrating These Frameworks
This blog discusses how different CTI frameworks can co-exist, and suggests some practical rules to bear in mind when integrating these frameworks into intelligence practices.
SANS Cyber Threat Intelligence Summit 2020: A Recap
Last week I attended the eighth annual SANS Cyber Threat Intelligence Summit in Crystal City, Virginia. I want to take some time to recap the event for those that were not able to attend.
Weekly Intelligence Summary 24 Jan 2020
During the past 12 months, Digital Shadows has observed a rise in “mobile malware”―the use of malware targeting mobile devices/operating systems (OS)―as well as legitimate apps used maliciously.
How Digital Shadows Helped Find and Remediate an Exposed Admin Password on Github
In this blog series, we’ll share some tales from the front lines – keeping client names anonymous, of course. We’ll investigate some of SearchLight’s most impactful findings, and more importantly, she
Inside Digital Shadows: Davitt Potter Joins as Director of MSSP and Channels in the Americas
I’ve recently had the opportunity to join Digital Shadows, who have built an amazing offering in the digital risk protection and threat intelligence space.
How the Cybercriminal Underground Mirrors the Real World
In many cases the cybercriminal underground is a lot more familiar than you might be led to believe...
Weekly Intelligence Summary 17 Jan 2020
The cyber-extortion landscape has shown real signs of strength and advancement in the past three months...
NSA Vulnerability Disclosure, Ransomware News, And Iran Updates
Kacey, Charles, Alex, and Harrison host this week’s threat intelligence update from Dallas. We kick off with vulnerabilities from the week. This includes both the NSA CVE and Citrix CVE. The team...
Third Party Risk: 4 ways to manage your security ecosystem