Digital Shadows Resources Center

Welcome to our Digital Risk Protection Resources Center. Learn about digital risk protection across the open, deep, and dark web.

  • Initial Access Brokers Report

    Initial Access Brokers Report

    Initial access brokers are benefitting from a rise in adoption of remote access software. This Initial Access Brokers Report analyzes this phenomenon and what it means for security practitioners.

    Read Report
  • Resources for Your Team during the Coronavirus Pandemic

    Take Me There
  • Exposed Credentials Solutions Guide

    Get Your Copy
  • Initial Access Brokers: A Deep Dive

    On-demand Webinar

    Watch Here
  • Weekly: When Initial Access Brokers Attack

    Weekly: When Initial Access Brokers Attack

    ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

    Read Post
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • Weekly Intelligence Summary 26 February

    Weekly Intelligence Summary 26 February

    The People’s Republic of China-linked advanced persistent threat group “APT31” reportedly cloned and deployed a zero-day exploit developed by NSA's Equation Group in 2013.

    Read Report
  • Weekly: Egregor Arrests, SIM-Swapping, and Oldsmar Updates!

    Weekly: Egregor Arrests, SIM-Swapping, and Oldsmar Updates!

    ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence.

    Read Post
  • Check out our Weekly Intelligence Summary

    Access Here
  • Weekly Intelligence Summary 19 February

    Weekly Intelligence Summary 19 February

    An unidentified attacker accessed the computer systems of a water treatment facility in the US, altering sodium hydroxide levels in the potable water supply.

    Read Report
  • Exposed Credentials Solutions Guide

    Exposed Credentials Solutions Guide

    This guide draws from best practices suggested in SearchLight’s playbooks, so security professionals can improve their tools and processes to prevent employee account takeover.

    Read Report
  • Want To Try Our Digital Risk Protection Tool?

    Get Started Free
  • Weekly: Ransomware Updates - CDPR Victimized, Ziggy’s End, and the Oldsmar Water Incident

    Weekly: Ransomware Updates - CDPR Victimized, Ziggy’s End, and the Oldsmar Water Incident

    ShadowTalk hosts Alec, Ivan, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

    Read Post
  • Heard our ShadowTalk Threat Intelligence Podcast?

    Subscribe Here!
  • Weekly Intelligence Summary 12 February

    Weekly Intelligence Summary 12 February

    Following the disclosure of the SolarWinds supply-chain compromise in December 2020, details continue to emerge about the scale of the attack.

    Read Report
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Weekly: Lebanese Cedar, Nefilim Ghost Credentials, and More on SolarWinds and Emotet

    Weekly: Lebanese Cedar, Nefilim Ghost Credentials, and More on SolarWinds and Emotet

    ShadowTalk hosts Stefano, Adam, and Kim bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 05 February

    Weekly Intelligence Summary 05 February

    The North Korean advanced persistent threat (APT) group “ZINC” has been targeting cyber-security professionals with social engineering that leads to malware delivery.

    Read Report
  • 6 Considerations When Purchasing Threat Intelligence

    6 Considerations When Purchasing Threat Intelligence

    When selecting the optimal Cyber Threat Intelligence solution for your organization, use this guide to assess threat intelligence providers across 6 critical categories.

    Read Report
  • Weekly: Law Enforcement Wins the Week - The Fall of NetWalker and Emotet!

    Weekly: Law Enforcement Wins the Week - The Fall of NetWalker and Emotet!

    ShadowTalk hosts Alec, Charles, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 29 January

    Weekly Intelligence Summary 29 January

    A new web portal is aiding cyber-threat incident responders by detailing vulnerabilities in popular malware.

    Read Report
  • Weekly: CISA Security Advisory, IObit Attack, and more SolarWinds!

    Weekly: CISA Security Advisory, IObit Attack, and more SolarWinds!

    ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence.

    Read Post
  • 2021 Cybersecurity Forecasts: Trends and Predictions For the New Year31:28

    2021 Cybersecurity Forecasts: Trends and Predictions For the New Year

    In this session, Digital Shadows will share their insights and assessments into what we can expect to see in 2021.

    Watch Video
  • Holiday Cybercrime: Krampus is in Town

    Holiday Cybercrime: Krampus is in Town

    In this blog, we explore how cybercriminals are taking advantage of not-so-cheery sales this holiday season. From carding methods to account sales, nothing is off-limits.

    Read Post
  • Digital Shadows’ Top Five Blogs of 2020

    Digital Shadows’ Top Five Blogs of 2020

    We are here to go through the top five blogs of 2020—one for each quarter plus a bonus one to quickly recap why they (still) matter and be better prepared for the exciting new year in security.

    Read Post
  • Impersonator Syndrome: Supply chain lures and COVID-19 cures

    Impersonator Syndrome: Supply chain lures and COVID-19 cures

    While we’ve reported on recent Q3 ransomware campaigns targeting the healthcare industry, a new campaign targeting COVID-19 vaccine supply chain partners has emerged.

    Read Post
  • How Cybercriminals Answer “What do you do for a living?”

    How Cybercriminals Answer “What do you do for a living?”

    Have you ever wondered how cybercriminals explain their mysterious means of income to others? While not all threat actors’ illicit ...

    Read Post
  • THE TOP 3 CYBERSECURITY THREATS IN THE MIDDLE EAST

    THE TOP 3 CYBERSECURITY THREATS IN THE MIDDLE EAST

    Rising rates of cybercriminal activities occur as threat actors observe the flourishing economies in the Middle East.

    Read Post
  • loading
    Loading More...