Digital Shadows Resources Center

Welcome to our Digital Risk Protection Resources Center. Learn about digital risk protection across the open, deep, and dark web.

  • Cybersecurity for a Small Business: Latest Threats22:13

    Cybersecurity for a Small Business: Latest Threats

    Ryan Floyd, venture capitalist and co-founder Storm Ventures, talks about the latest cybersecurity threats you should be aware of with Digital Shadows CEO, Alastair Paterson.

    Watch Video
  • ×

    Digital Risk Protection in a Modern Threat Landscape

    - October 28th -
    Live Webinar

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2021Sep22 - Prospect Webinar - Exposed Data
    Thank you!
    Error - something went wrong!
  • Data Leakage Detection Solutions Guide

    Data Leakage Detection Solutions Guide

    This guide outlines how to detect, analyze, and remediate data leakage–including a treasure chest of free tooling.

    Read Report
  • Weekly Intelligence Summary 22nd Oct

    Weekly Intelligence Summary 22nd Oct

    Read Report
  • Impersonating Domains Report

    Impersonating Domains Report

    In this report, Digital Shadows’ Photon Team analyzed a data set of more than 175,000 impersonating domains raised to our clients over four months of 2021.

    Read Report
  • Digital Shadows Named #1 in Digital Risk Protection

    Read Report
  • Weekly: REvil Rep Death, Ransomware Trends, and BlackMatter Advisory

    Weekly: REvil Rep Death, Ransomware Trends, and BlackMatter Advisory

    This episode of ShadowTalk covers a REvil rep death, Q3 Ransomware trends, and the BlackMatter CISA advisory.

    Read Post
  • Ransomware Q3 Roll Up

    Ransomware Q3 Roll Up

    We have reached the end of another quarter, and it is time again for us to have a look back ...

    Read Post
  • Social Media Monitoring Solutions Guide

    Social Media Monitoring Solutions Guide

    This Solutions Guide to learn how to protect your organizations social footprint with the top Social Media Monitoring use cases Digital Shadows has identified.

    Read Report
  • Digital Shadows | SearchLight1:49

    Digital Shadows | SearchLight

    As the leader in threat intel and drp SearchLight is the most comprehensive and awarded solution available. Ready to learn a better way to tackle Threat Intelligence? Get started today!

    Watch Video
  • Common Typosquat and Combosquat Techniques

    Common Typosquat and Combosquat Techniques

    This infographic details the two high level types of domain impersonation: typosquats and combosquats, and the 10 different strategies used by threat actors.

    Read Report
  • Cybersecurity Awareness Month: Week 2 - Fight the Phish!

    Cybersecurity Awareness Month: Week 2 - Fight the Phish!

    This blog sheds light on some of the lesser-known tactics used in phishing campaigns. Knowing more about the different tactics cybercriminals use will make you better equipped to Fight the Phish!

    Read Post
  • Domain Monitoring Solutions Guide

    Domain Monitoring Solutions Guide

    This guide outlines what potential data sources, detection methods, context, and remediation actions to consider if you want to effectively monitor domains and mitigate the risk of data loss, exposed

    Read Report
  • What is Third Party Risk?

    What is Third Party Risk?

    Third party risk is the process of managing risks introduced by suppliers and third parties, often specifically to sensitive data and customer information.

    Read Post
  • Cyber Threat Intelligence Solutions Guide

    Cyber Threat Intelligence Solutions Guide

    This guide outlines best practices for cyber threat intelligence and features resources to leverage when developing or improving your organization's cyber threat intelligence capabilities.

    Read Report
  • Weekly Intelligence Summary 15th Oct

    Weekly Intelligence Summary 15th Oct

    Read Report
  • Weekly: FIN12 Targets Healthcare, Google Phishing, and Pentagon Official Resigns

    Weekly: FIN12 Targets Healthcare, Google Phishing, and Pentagon Official Resigns

    This episode they covers: FIN12 targets healthcare sector, Google targeted by APT phishing campaign, and a US Official resign over US-Chinese AI & cybersecurity difference.

    Read Post
  • Cybersecurity Awareness Month: Week 1 – Managing Your Digital Shadow

    Cybersecurity Awareness Month: Week 1 – Managing Your Digital Shadow

    Being cyber smart is more than simply patching vulnerabilities, using strong passwords, and your usual cyber security best practices. It is also about the little things.

    Read Post
  • Initial Access Brokers Report

    Initial Access Brokers Report

    Initial access brokers are benefitting from a rise in adoption of remote access software. This Initial Access Brokers Report analyzes this phenomenon and what it means for security practitioners.

    Read Report
  • Weekly Intelligence Summary 8th Oct

    Weekly Intelligence Summary 8th Oct

    Read Report
  • Weekly: Twitch Hack, Facebook blackout, and Pandora Papers

    Weekly: Twitch Hack, Facebook blackout, and Pandora Papers

    This ShadowTalk covers the Twitch hack, Facebook takes a day off, Ransomware roundup - revelations from REvil, LockBit, and Conti, and the Pandora Papers release.

    Read Post
  • Exposed Credentials Solutions Guide

    Exposed Credentials Solutions Guide

    This guide draws from best practices suggested in SearchLight’s playbooks, so security professionals can improve their tools and processes to prevent employee account takeover.

    Read Report
  • loading
    Loading More...