Digital Shadows Resources Center

Welcome to our Digital Risk Protection Resources Center. Learn about digital risk protection across the open, deep, and dark web.

  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • Digital Risk Protection 2018 Forrester New Wave

    Digital Risk Protection 2018 Forrester New Wave

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Detecting Exposed Credentials

    Detecting Exposed Credentials

    See how one large bank detected more than 50,000 exposed credentials in 1 year.

    Read Report
  • Weekly Intelligence Summary 11 Apr - 18 Apr 2019

    Weekly Intelligence Summary 11 Apr - 18 Apr 2019

    In the spotlight: An unidentified threat actor has obtained data from various personal Outlook, MSN, and Hotmail email accounts by compromising a Microsoft customer support account.

    Read Report
  • Weekly Intelligence Summary

    Access Here
  • Dark Web Typosquatting: Scammers v. Tor

    Dark Web Typosquatting: Scammers v. Tor

    Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can ...

    Read Post
  • Detecting Spoof Domains - Domain Infringement

    Detecting Spoof Domains - Domain Infringement

    See how one global retailer detected almost 2,000 domains impersonating their brand.

    Read Report
  • Try SearchLight Free
    for 7 Days

    Get Started Now
  • ×

    Live Webinar on
    April 30th:

    Best Practices Protecting Your Brand from Escalating Digital Threats

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 April - Brand w/ Tiffany Webinar
    Thank you!
    Error - something went wrong!
  • Digital Risk Protection and Cyber Threat Intelligence2:13

    Digital Risk Protection and Cyber Threat Intelligence

    Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita

    Watch Video
  • A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.

    Read Report
  • ×

    Join 150k subscribers and get the latest news & threat intel in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Weekly Intelligence Summary: Ep 15

    Weekly Intelligence Summary: Ep 15

    This week the team discusses an unidentified threat actor that has obtained data from various personal Outlook, MSN, and Hotmail email accounts by compromising a Microsoft customer support...

    Read Post
  • Digital Shadows - Detecting Fake Social Media Profiles

    Digital Shadows - Detecting Fake Social Media Profiles

    See how a bank removed a spoof social media profiles targeting customers.

    Read Report
  • Subscribe to ShadowTalk on iTunes!

    Subscribe Now
  • Weekly Intelligence Summary: Ep 14

    Weekly Intelligence Summary: Ep 14

    Christian and Jamie join Harrison for another week of ShadowTalk to discuss the FIN6 threat actor reportedly widening its range of attacks to include ransomware, potentially inciting the threat...

    Read Post
  • Detecting Infrastructure Weaknesses - Open Ports

    Detecting Infrastructure Weaknesses - Open Ports

    See how a technology company prevented a possible ransomware infection.

    Read Report
  • Reducing your attack surface

    Reducing your attack surface

    What is an attack surface According to OWASP, an attack surface “describes all of the different points where an attacker could ...

    Read Post
  • Predator: Modeling the attacker’s mindset

    Predator: Modeling the attacker’s mindset

    Author: Richard Gold  The phrases “attacker’s mindset” or “think like an attacker” are often used in cyber security to encourage ...

    Read Post
  • Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar50:58

    Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar

    The regulatory landscape is rapidly evolving and making it increasingly difficult to effectively respond to cyberattacks and data breaches in order to limit the damages. You’ll hear about the shifting

    Watch Video
  • Weekly Intelligence Summary: Ep 13

    Weekly Intelligence Summary: Ep 13

    Jamie, Alex and Zuko sit down with Harrison to talk about a story that flew a little under the radar this week; Russia has allegedly been conducting a widespread satellite spoofing campaign since...

    Read Post
  • Digital Shadows Company Overview Video3:05

    Digital Shadows Company Overview Video

    Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.

    Watch Video
  • Easing into the extortion game

    Easing into the extortion game

    One of the main ideas which flowed through Photon’s most recent research report, A Tale of Epic Extortions, was that cyber ...

    Read Post
  • How to Secure Your Online Brand

    How to Secure Your Online Brand

    What is online brand security? As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand ...

    Read Post
  • Detecting Exposed Company Data: The What, Why, and How

    Detecting Exposed Company Data: The What, Why, and How

    What is data loss detection? A fundamental responsibility for any IT security professional is to secure their information assets, be ...

    Read Post
  • loading
    Loading More...