Digital Shadows Resources Center

Welcome to our Digital Risk Protection Resources Center. Learn about digital risk protection across the open, deep, and dark web.

  • Weekly Intelligence Summary 23rd July

    Weekly Intelligence Summary 23rd July

    Read Report
  • ×

    Impersonating Domains: Breaking Research and New Functionality

    - Live Webinar - July 28th

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2021Jul28 - Prospect Webinar - Impersonating Domains
    Thank you!
    Error - something went wrong!
  • Q2 2021 Cyber Threat Report: Technology

    Q2 2021 Cyber Threat Report: Technology

    Read Report
  • Want To Try Our Digital Risk Protection Tool?

    Get Started Free
  • Impersonating Domains Report

    Impersonating Domains Report

    In this report, Digital Shadows’ Photon Team analyzed a data set of more than 175,000 impersonating domains raised to our clients over four months of 2021.

    Read Report
  • Initial Access Brokers: A Deep Dive

    On-demand Webinar

    Watch Here
  • Weekly Intelligence Summary 16th July

    Weekly Intelligence Summary 16th July

    Read Report
  • Q2 2021 Cyber Threat Report: Travel and Leisure Threats

    Q2 2021 Cyber Threat Report: Travel and Leisure Threats

    Read Report
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • Domain Monitoring Solutions Guide

    Domain Monitoring Solutions Guide

    This guide outlines what potential data sources, detection methods, context, and remediation actions to consider if you want to effectively monitor domains and mitigate the risk of data loss, exposed

    Read Report
  • Exposed Credentials Solutions Guide

    Get Your Copy
  • Q2 2021 Cyber Threat Report: Ransomware

    Q2 2021 Cyber Threat Report: Ransomware

    Read Report
  • Common Typosquat and Combosquat Techniques

    Common Typosquat and Combosquat Techniques

    This infographic details the two high level types of domain impersonation: typosquats and combosquats, and the 10 different strategies used by threat actors.

    Read Report
  • Weekly: VPN Vulnerabilities, EA Gets Attacked, Plus Clop Deals With Affiliate Arrests

    Weekly: VPN Vulnerabilities, EA Gets Attacked, Plus Clop Deals With Affiliate Arrests

    ShadowTalk hosts Sean, Ivan, and Charles bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 18 June

    Weekly Intelligence Summary 18 June

    A newly identified advanced persistent threat (APT) group, “Agrius”, has been exposed as the perpetrator of destructive attacks against Israeli organizations since late 2020.

    Read Report
  • Weekly: Drug Kingpin Taken Down by Cheese and Ransomware Makes a Comeback

    Weekly: Drug Kingpin Taken Down by Cheese and Ransomware Makes a Comeback

    ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 28 May

    Weekly Intelligence Summary 28 May

    US President Joe Biden recently signed an executive order (EO) aimed at strengthening network security for US federal government departments, and agencies and contractors working with them.

    Read Report
  • Resources for Your Team during the Coronavirus Pandemic

    Take Me There
  • Dark Web Monitoring Solutions Guide

    Dark Web Monitoring Solutions Guide

    This guide shares years of operational best practices and expands on where dark web intelligence is useful and can be effectively leveraged into action for security teams.

    Read Report
  • Weekly: Colonial Pipeline Updates, DarkSide Feels the Pressure, and More!

    Weekly: Colonial Pipeline Updates, DarkSide Feels the Pressure, and More!

    ShadowTalk hosts Sean, Alec, Ivan, and Charles bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 21 May

    Weekly Intelligence Summary 21 May

    A “Conti” ransomware attack on Ireland’s healthcare system, the Health Service Executive (HSE), significantly delayed the delivery of medical laboratory results and affected many outpatient services.

    Read Report
  • Check out our Weekly Intelligence Summary

    Access Here
  • Weekly: The Colonial Pipeline Incident, BEC Gift Card Campaigns, and More!

    Weekly: The Colonial Pipeline Incident, BEC Gift Card Campaigns, and More!

    ShadowTalk hosts Stefano, Chris, Kim, and Xue bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 14 May

    Weekly Intelligence Summary 14 May

    Colonial Pipeline Company fell victim to a cyber attack that resulted in 5,500 miles of its US fuel pipelines being shut down, causing public distress and fears of fuel shortages.

    Read Report
  • Weekly: VPN Vulnerabilities, Supply Chain Attacks, and Babuk Says “Bye”!

    Weekly: VPN Vulnerabilities, Supply Chain Attacks, and Babuk Says “Bye”!

    ShadowTalk hosts Alec, Ivan, Sean, and Digital Shadows CISO, Rick, bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 07 May

    Weekly Intelligence Summary 07 May

    Security researchers discovered two unrelated cyber-threat campaigns targeting Microsoft SharePoint.

    Read Report
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Cyber Threat Intelligence Solutions Guide

    Cyber Threat Intelligence Solutions Guide

    This guide outlines best practices for cyber threat intelligence and features resources to leverage when developing or improving your organization's cyber threat intelligence capabilities.

    Read Report
  • loading
    Loading More...