Digital Shadows Resources Center

Welcome to our Digital Risk Protection Resources Center. Learn about digital risk protection across the open, deep, and dark web.

  • Digital Risk Protection: Forrester New Wave Report

    Digital Risk Protection: Forrester New Wave Report

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • Party with us at RSA Conference 2020!

    RSVP Now
  • Weekly Intelligence Summary 24 Jan 2020

    Weekly Intelligence Summary 24 Jan 2020

    During the past 12 months, Digital Shadows has observed a rise in “mobile malware”―the use of malware targeting mobile devices/operating systems (OS)―as well as legitimate apps used maliciously.

    Read Report
  • How Digital Shadows Helped Find and Remediate an Exposed Admin Password on Github

    How Digital Shadows Helped Find and Remediate an Exposed Admin Password on Github

      I often get asked to share examples of the types of alerts we send to clients. I work on ...

    Read Post
  • How the Cybercriminal Underground Mirrors the Real World

    How the Cybercriminal Underground Mirrors the Real World

    In many cases the cybercriminal underground is a lot more familiar than you might be led to believe...

    Read Post
  • Check out our Weekly Intelligence Summary

    Access Here
  • NSA Vulnerability Disclosure, Ransomware News, And Iran Updates

    NSA Vulnerability Disclosure, Ransomware News, And Iran Updates

    Kacey, Charles, Alex, and Harrison host this week’s threat intelligence update from Dallas. We kick off with vulnerabilities from the week. This includes both the NSA CVE and Citrix CVE. The team...

    Read Post
  • Iranian Cyber Threats: Practical Advice for Security Professionals

    Iranian Cyber Threats: Practical Advice for Security Professionals

    Unless you went very dark for an extended holiday break, you are no doubt very well aware of the United ...

    Read Post
  • Want To Try Our Digital Risk Protection Tool?

    Get Started Free
  • CVE-2019-19781: Analyzing the Exploit

    CVE-2019-19781: Analyzing the Exploit

      On December 17th 2019, CVE-2019-19781 was disclosed. The vulnerability allows for directory traversal and remote code execution on Citrix ...

    Read Post
  • Heard our ShadowTalk Threat Intelligence Podcast?

    Subscribe Here!
  • Third Party Risk: 4 ways to manage your security ecosystem

    Third Party Risk: 4 ways to manage your security ecosystem

      The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can ...

    Read Post
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Inside Digital Shadows: Davitt Potter Joins as Director of MSSP and Channels in the Americas

    Inside Digital Shadows: Davitt Potter Joins as Director of MSSP and Channels in the Americas

    I’ve recently had the opportunity to join Digital Shadows, who have built an amazing offering in the digital risk protection and threat intelligence space.

    Read Post
  • NSA Vulnerability Disclosure: Pros and Cons

    NSA Vulnerability Disclosure: Pros and Cons

      On Monday, January 13th, Brian Krebs reported that Microsoft would be releasing “a software update on Tuesday to fix ...

    Read Post
  • Iran and the United States – start of the long war or return to normal?

    Iran and the United States – start of the long war or return to normal?

    There are useful precedents that can assist when we consider how this will unfold in the near-term future.

    Read Post
  • 2020 Cybersecurity Forecasts: 5 trends and predictions for the new year

    2020 Cybersecurity Forecasts: 5 trends and predictions for the new year

    In this blog, we discuss several significant trends and events that have helped shape the cyber threat landscape, all of which will almost certainly continue through 2020.

    Read Post
  • Iranian Cyber Threats: Practical Advice From CISO Rick Holland

    Iranian Cyber Threats: Practical Advice From CISO Rick Holland

    Rick Holland (CISO at Digital Shadows) joins Harrison to share his thoughts on the Iranian cyber threat and what it means for cyber defenders. What should security practitioners be concerned...

    Read Post
  • Forums are Forever – Part 1: Cybercrime Never Dies

    Forums are Forever – Part 1: Cybercrime Never Dies

    The survival of the cybercriminal forum in the face of new, more secure technologies and constant pressure from law enforcement does not come as a surprise to researchers at Digital Shadows.

    Read Post
  • The Modern Cybercriminal Forum

    The Modern Cybercriminal Forum

    We took a deep-dive into the cybercriminal underground to investigate the persistence of forums, uncovering several reasons they remain attractive amid appealing alternatives.

    Read Report
  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • Iranian APT Groups’ Tradecraft Styles: Using Mitre ATT&CK™ and Essential 819:50

    Iranian APT Groups’ Tradecraft Styles: Using Mitre ATT&CK™ and Essential 8

    Rick Holland and Richard Gold talk through the team's research into Iranian APT groups' tradecraft styles using Mitre ATT&CK™ and the ASD Essential 8.

    Watch Video
  • Iran and Soleimani: Monitoring the Situation

    Iran and Soleimani: Monitoring the Situation

    We focus on the cyber-related fallout from the situation, and ways that they may or may not impact our clients. We will continue to update this blog as related events unfold.

    Read Post
  • Iranian APT Groups’ Tradecraft Styles: Using Mitre ATT&CK™ and the ASD Essential 8

    Iranian APT Groups’ Tradecraft Styles: Using Mitre ATT&CK™ and the ASD Essential 8

    We will use the Essential 8 as part of our toolkit in thinking about how to mitigate against the TTPs used by these APT groups.

    Read Post
  • Iranian Cyber Threats: Practical Advice for Security Professionals28:12

    Iranian Cyber Threats: Practical Advice for Security Professionals

    Rick Holland and Harrison Van Riper sit down to walk through Rick's latest blog on advice around the Iranian cyber threats.

    Watch Video
  • loading
    Loading More...