Digital Shadows Resources Center

Welcome to our Digital Risk Protection Resources Center. Learn about digital risk protection across the open, deep, and dark web.

  • From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

    From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

    Over the past 2.5 years, we have been analyzing how cybercriminals conspire to prey upon users of online services by “taking over” the accounts they all use...

    Read Report
  • Resources for Your Team during the Coronavirus Pandemic

    Take Me There
  • Weekly: PAN-OS Vulnerability, Lazarus Group, BEC scammer “Hushpuppi”, and New Photon ATO Research

    Weekly: PAN-OS Vulnerability, Lazarus Group, BEC scammer “Hushpuppi”, and New Photon ATO Research

    Digital Shadows team Viktoria, Demelza, Adam and Stefano host this week's podcast.

    Read Post
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • SPECIAL: Guest Speaker Tom Schmitt Talks About His Origins in Cyber Threat Intel and TITO

    SPECIAL: Guest Speaker Tom Schmitt Talks About His Origins in Cyber Threat Intel and TITO

    CISO Rick Holland and Host Alex Guirakhoo chat with this week's special guest Tom Schmitt, Global Director of Threat Intelligence at Anheuser-Busch InBev.

    Read Post
  • ×

    Account Takeover: Data Findings, Popular Tools, and Prevalent Actors

    - July 15 -
    Live Webinar

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2020 June - ATO Webinar
    Thank you!
    Error - something went wrong!
  • Weekly Intelligence Summary 10 July 2020

    Weekly Intelligence Summary 10 July 2020

    Ransomware appeared on the horizon long before 2020, but has arguably taken the cyber-threat landscape by storm over the past six months.

    Read Report
  • Check out our Weekly Intelligence Summary

    Access Here
  • Threat Model of a Remote Worker [Recorded Webinar]56:31

    Threat Model of a Remote Worker [Recorded Webinar]

    Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has

    Watch Video
  • Forrester New Wave Report: Digital Risk Protection

    Forrester New Wave Report: Digital Risk Protection

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Want To Try Our Digital Risk Protection Tool?

    Get Started Free
  • SPECIAL: What Goes Into The Verizon DBIR With Alex Pinto

    SPECIAL: What Goes Into The Verizon DBIR With Alex Pinto

    CISO Rick Holland and Host Alex Guirakhoo chat with Alex Pinto from Verizon around the Verizon DBIR. They talk through Pinto’s background, how the Verizon DBIR gets put together, findings from...

    Read Post
  • Heard our ShadowTalk Threat Intelligence Podcast?

    Subscribe Here!
  • Ensuring order in the underground: Recruiting moderators on cybercriminal forums

    Ensuring order in the underground: Recruiting moderators on cybercriminal forums

    While there have been many predictable consequences of the ongoing global COVID-19 (aka coronavirus) pandemic, few would have foreseen significant ...

    Read Post
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Reducing technical leakage: Detecting software exposure from the outside-in

    Reducing technical leakage: Detecting software exposure from the outside-in

    Modern Development Practices Leads to Increased Exposure As customers, we can be a bit demanding when it comes to technology ...

    Read Post
  • Weekly: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights From DS CISO Rick

    Weekly: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights From DS CISO Rick

    Alex, Kacey, Charles and Rick host this week’s ShadowTalk to bring you the latest threat intelligence stories.

    Read Post
  • Detecting Unauthorized Code Commits

    Detecting Unauthorized Code Commits

    See how a technology company discovered credentials for their CRM platform.

    Read Report
  • New DDoS protection tool advertised on the dark web

    New DDoS protection tool advertised on the dark web

    This blog examines a newly launched DDoS protection filter mechanism dubbed EndGame advertised last week on the dark web community ...

    Read Post
  • CISA and FBI alert: Top vulnerabilities exploited from 2016-2019 and trends from 2020

    CISA and FBI alert: Top vulnerabilities exploited from 2016-2019 and trends from 2020

    A couple of weeks ago, the United States Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation ...

    Read Post
  • Security Threat Intel Products and Services: Mapping SearchLight

    Security Threat Intel Products and Services: Mapping SearchLight

    Very few organizations have access to vast resources that will enable them to build out a ...

    Read Post
  • The 2020 Verizon Data Breach Investigations Report: One CISO’s View

    The 2020 Verizon Data Breach Investigations Report: One CISO’s View

    Sadly, Marvel’s Black Widow release date was pushed back as a result of COVID19, but thankfully the 2020 Verizon Data ...

    Read Post
  • SPECIAL EPISODE: Contact Tracing and COVID-19

    SPECIAL EPISODE: Contact Tracing and COVID-19

    Physician-Scientist, Dr. Pratik Sinha, joins Alastair Paterson, and Rick Holland for this special guest episode. The group walks through Al and Pratik’s recent research into contact tracing.

    Read Post
  • [Infographic] Threat Model of a Remote Worker

    [Infographic] Threat Model of a Remote Worker

    Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 (aka coronavirus) has forced many organizations to accelerate their plans or create them on the fly.

    Read Report
  • SPECIAL EPISODE: Remote Worker Security: Tech & ISP Providers, Data Security, And The Future

    SPECIAL EPISODE: Remote Worker Security: Tech & ISP Providers, Data Security, And The Future

    We're pleased to have a special guest, Steve Marshall, CISO and Head of Cyber Consulting at Bytes- a Software Licensing Reseller & IT Security Services. in this special episode, Steve Marshall,...

    Read Post
  • How cybercriminals are taking advantage of COVID-19: Scams, fraud, and misinformation

    How cybercriminals are taking advantage of COVID-19: Scams, fraud, and misinformation

    While COVID-19 itself presents a significant global security risk to individuals and organizations across the world, cybercriminal activity around this global pandemic can result in financial damage a

    Read Post
  • COVID-19: Dark Web Reactions

    COVID-19: Dark Web Reactions

    Digital Shadows has been researching the cybercriminal response to the COVID-19 outbreak sweeping across the globe. We’ve been monitoring several dark web forums, looking for answers to questions ...

    Read Post
  • loading
    Loading More...