Digital Shadows Resources Center

Welcome to our Digital Risk Protection Resources Center. Learn about digital risk protection across the open, deep, and dark web.

  • Weekly Intelligence Summary 20 November

    Weekly Intelligence Summary 20 November

    “CostaRicto” has become the fourth cyber-mercenary group to be discovered in 2020.

    Read Report
  • Resources for Your Team during the Coronavirus Pandemic

    Take Me There
  • Weekly: SandWorm Indicted by DOJ, Darkside Has A Soft Spot, and Ryuk's Super Speedy Attack!

    Weekly: SandWorm Indicted by DOJ, Darkside Has A Soft Spot, and Ryuk's Super Speedy Attack!

    ShadowTalk hosts Kacey, Alec, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

    Read Post
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

    From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

    Over the past 2.5 years, we have been analyzing how cybercriminals conspire to prey upon users of online services by “taking over” the accounts they all use...

    Read Report
  • ×

    2021 Cybersecurity Forecasts: Trends and Predictions for the New Year

    - December 09 -
    Live Webinar

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2020Dec09 - Predictions Webinar
    Thank you!
    Error - something went wrong!
  • Weekly: The Team Talks Baka, Epic Manchego, and Smaug, Plus Emotet Rides Again

    Weekly: The Team Talks Baka, Epic Manchego, and Smaug, Plus Emotet Rides Again

    This week’s host Kacey is joined by Charles and Alec to bring you the latest in threat intelligence.

    Read Post
  • Check out our Weekly Intelligence Summary

    Access Here
  • Special: Guest David Bianco Talks Origin Story, Pyramid of Pain, and More

    Special: Guest David Bianco Talks Origin Story, Pyramid of Pain, and More

    ShadowTalk hosts Alex and Digital Shadows CISO, Rick, talk to special guest David about his beginnings in the cybersecurity space, the Pyramid of Pain, and threat hunting. Pyramid of Pain:...

    Read Post
  • 2020 Cyber Threat Intelligence Estimate

    2020 Cyber Threat Intelligence Estimate

    Digital Shadows has contributed to Optiv's 2020 Threat Intelligence Landscape Estimate, which provides a view of the cyber-threat landscape to help organizations mitigate risk and strengthen their...

    Read Report
  • Want To Try Our Digital Risk Protection Tool?

    Get Started Free
  • Weekly: Emotet Gets a Vaccine, NSA Drovorub Advisory, and North Korean Activity plus Bureau 121

    Weekly: Emotet Gets a Vaccine, NSA Drovorub Advisory, and North Korean Activity plus Bureau 121

    ShadowTalk hosts Viktoria, Adam, Dylan, and Stefano bring you the latest in threat intel.

    Read Post
  • Heard our ShadowTalk Threat Intelligence Podcast?

    Subscribe Here!
  • Special: Guest Geoff White Talks Best-Selling Book Crime Dot Com

    Special: Guest Geoff White Talks Best-Selling Book Crime Dot Com

    ShadowTalk hosts Viktoria and James talk to special guest Geoff about his best selling book Crime Dot Com.

    Read Post
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Webinar: Account Takeover: Data Findings, Popular Tools, and Prevalent Actors0:00

    Webinar: Account Takeover: Data Findings, Popular Tools, and Prevalent Actors

    Join the Photon team to learn about our latest research on account takeover.

    Watch Video
  • SPECIAL: Guest Speaker Tom Schmitt Talks About His Origins in Cyber Threat Intel and TITO

    SPECIAL: Guest Speaker Tom Schmitt Talks About His Origins in Cyber Threat Intel and TITO

    CISO Rick Holland and Host Alex Guirakhoo chat with this week's special guest Tom Schmitt, Global Director of Threat Intelligence at Anheuser-Busch InBev.

    Read Post
  • Threat Model of a Remote Worker [Recorded Webinar]56:31

    Threat Model of a Remote Worker [Recorded Webinar]

    Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has

    Watch Video
  • Forrester New Wave Report: Digital Risk Protection

    Forrester New Wave Report: Digital Risk Protection

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • SPECIAL: What Goes Into The Verizon DBIR With Alex Pinto

    SPECIAL: What Goes Into The Verizon DBIR With Alex Pinto

    CISO Rick Holland and Host Alex Guirakhoo chat with Alex Pinto from Verizon around the Verizon DBIR. They talk through Pinto’s background, how the Verizon DBIR gets put together, findings from...

    Read Post
  • Ensuring order in the underground: Recruiting moderators on cybercriminal forums

    Ensuring order in the underground: Recruiting moderators on cybercriminal forums

    While there have been many predictable consequences of the ongoing global COVID-19 (aka coronavirus) pandemic, few would have foreseen significant ...

    Read Post
  • Reducing technical leakage: Detecting software exposure from the outside-in

    Reducing technical leakage: Detecting software exposure from the outside-in

    Modern Development Practices Leads to Increased Exposure As customers, we can be a bit demanding when it comes to technology ...

    Read Post
  • Detecting Unauthorized Code Commits

    Detecting Unauthorized Code Commits

    See how a technology company discovered credentials for their CRM platform.

    Read Report
  • New DDoS protection tool advertised on the dark web

    New DDoS protection tool advertised on the dark web

    This blog examines a newly launched DDoS protection filter mechanism dubbed EndGame advertised last week on the dark web community ...

    Read Post
  • CISA and FBI alert: Top vulnerabilities exploited from 2016-2019 and trends from 2020

    CISA and FBI alert: Top vulnerabilities exploited from 2016-2019 and trends from 2020

    A couple of weeks ago, the United States Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation ...

    Read Post
  • Security Threat Intel Products and Services: Mapping SearchLight

    Security Threat Intel Products and Services: Mapping SearchLight

    Very few organizations have access to vast resources that will enable them to build out a ...

    Read Post
  • The 2020 Verizon Data Breach Investigations Report: One CISO’s View

    The 2020 Verizon Data Breach Investigations Report: One CISO’s View

    Sadly, Marvel’s Black Widow release date was pushed back as a result of COVID19, but thankfully the 2020 Verizon Data ...

    Read Post
  • loading
    Loading More...