ESG: The Pressing Need for Digital Risk Management
CISOs and risk officers must adopt a thorough digital risk management strategy that includes monitoring, fi...
Error - something went wrong!
Other content in this Stream
Top Cyber Threats to the Healthcare & Pharmaceutical Sector
There is no shortage of cyber threats against the lucrative health care, medical device and pharmaceutical sectors. Discover the top cyber threats to these industries.
Eliminating Third Party Cyber Risks from Healthcare Delivery
Hear from Associate Director Suzanne Schwartz from the Food and Drug Administration and Digital Shadows for an informative session on best practices for eliminating third party risks.
Social Media Oversharing by Healthcare Executive Puts Firm at Risk
Digital Shadows helped a healthcare organization discover that one of its technical executives had included specific system, server models, and software versions on a career biography posted online.
Weekly Intelligence Summary 03 Oct - 10 Oct 2019
In the spotlight this week is the Iran-linked threat group “APT35”, which took aim at the email accounts of political entities in the United States and prominent Iranians living outside Iran.
Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground
we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat
Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence
We’re back in London this week! Viktoria chats with Adam Cook, Philip Doherty, and Josh Poole on this week’s top stories. - APT35 Targets Email of US political figures & prominent Iranians -...
Digital Risk Protection: Forrester New Wave Report
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction
How can the modern network of .onion marketplaces be understood through novels about a cyberpunk dystopia? The answer is in how dark web marketplaces grow and die.
Domain Squatting: The Phisher-man’s Friend
Simon talks about how easy it is to conduct domain squatting and typosquatting, and how little monitoring still goes on around them in the industry.
SecDevOps: Continued Database Exposures Point to Growing Challenges
Last week, we learned that millions of Ecuadorian’s personal details had been exposed by a misconfigured ElasticSearch database. This is ...
Dark Web Monitoring: The Good, The Bad, and The Ugly
Gaining access to dark web and deep web sources can be extremely powerful – if you focus on relevant use cases. The most successful strategies we observe have clear requirements, such as fraud detecti
Threat Intelligence Time Management and Prioritization: An Interview with Xena Olsen
Rick Holland and Harrison Van Riper interview Xena Olsen in this episode of ShadowTalk. The team focus their discussion on how to get timely, but effective intelligence out the door.
Two-Factor in Review
A technical assessment of the most popular mitigation for account takeover attacks
Detecting Infrastructure Weaknesses - Open Ports | Case Study
See how a technology company prevented a possible ransomware infection.
Too Much Information: The Sequel | New Research
There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.
Detecting Exposed Credentials | Case Study
See how one large bank detected more than 50,000 exposed credentials in 1 year.
Episode 18: Healthcare hacking, BGP hijacking, crypto jacking, and more
In this week’s episode of Shadow Talk, we cover the targeting of healthcare organizations by Orangeworm, BGP hijacking, vulnerabilities in MikroTik routers, DDoS market shutdowns, and the...
Detecting Spoof Domains - Domain Infringement | Case Study
See how one global retailer detected almost 2,000 domains impersonating their brand.
A Practical Guide to Reducing Digital Risk
This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.
SingHealth Breach Post-mortem: Key Findings