Digital Shadows Resources Center

Welcome to our Digital Risk Protection Resources Center. Learn about digital risk protection across the open, deep, and dark web.

  • Dark Web Monitoring Solutions Guide

    Dark Web Monitoring Solutions Guide

    This guide shares years of operational best practices and expands on where dark web intelligence is useful and can be effectively leveraged into action for security teams.

    Read Report
  • Weekly: VPN Vulnerabilities, Supply Chain Attacks, and Babuk Says “Bye”!

    Weekly: VPN Vulnerabilities, Supply Chain Attacks, and Babuk Says “Bye”!

    ShadowTalk hosts Alec, Ivan, Sean, and Digital Shadows CISO, Rick, bring you the latest in threat intelligence.

    Read Post
  • Want To Try Our Digital Risk Protection Tool?

    Get Started Free
  • Weekly Intelligence Summary 07 May

    Weekly Intelligence Summary 07 May

    Security researchers discovered two unrelated cyber-threat campaigns targeting Microsoft SharePoint.

    Read Report
  • ×

    Dark Web Monitoring: Best Practices and Use Cases

    - May 13 -
    Live Webinar

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2021May13 - Prospect Webinar - Dark Web Monitoring
    Thank you!
    Error - something went wrong!
  • Initial Access Brokers: A Deep Dive

    On-demand Webinar

    Watch Here
  • Cyber Threat Intelligence Solutions Guide

    Cyber Threat Intelligence Solutions Guide

    This guide outlines best practices for cyber threat intelligence and features resources to leverage when developing or improving your organization's cyber threat intelligence capabilities.

    Read Report
  • Weekly: Supply Chain Attacks Rule The Day, Plus The FBI Takes On Web-Shells

    Weekly: Supply Chain Attacks Rule The Day, Plus The FBI Takes On Web-Shells

    ShadowTalk hosts Alec, Ivan, Charles, and newcomer, Sean, bring you the latest in threat intelligence.

    Read Post
  • "Hands Down The Best Product Of Its Class, And A First Class Company"

    See Gartner Review
  • Weekly Intelligence Summary 23 April

    Weekly Intelligence Summary 23 April

    The FBI made digital copies of malicious web-shells before removing them from hundreds of vulnerable servers in the US, without any warning to affected organizations.

    Read Report
  • Exposed Credentials Solutions Guide

    Get Your Copy
  • Weekly: Q1 Ransomware Round-Up - Looking Back at Early 2021

    Weekly: Q1 Ransomware Round-Up - Looking Back at Early 2021

    ShadowTalk hosts Stefano, Adam, Kim, and Chris bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 16 April

    Weekly Intelligence Summary 16 April

    A cyber-espionage campaign was found targeting the Vietnamese military and government, as well as other sectors and some entities in Thailand and Central Asia.

    Read Report
  • Weekly: Facebook Data Breach, Ransomware Cartel, and More!

    Weekly: Facebook Data Breach, Ransomware Cartel, and More!

    ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 09 April

    Weekly Intelligence Summary 09 April

    A user of the cybercriminal forum RaidForums has offered 533 million records of Facebook user data for only a few US dollars.

    Read Report
  • Weekly: It’s A Ransomware Round-Up - CNA , Clop, and Much More!

    Weekly: It’s A Ransomware Round-Up - CNA , Clop, and Much More!

    ShadowTalk hosts Stefano, Dylan, Kim, and Chris bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 02 April

    Weekly Intelligence Summary 02 April

    Insurance provider CNA Financial has announced it was targeted in a cyber attack, later confirmed as involving the newly identified “Phoenix Cryptolocker” ransomware.

    Read Report
  • Resources for Your Team during the Coronavirus Pandemic

    Take Me There
  • Initial Access Brokers Report

    Initial Access Brokers Report

    Initial access brokers are benefitting from a rise in adoption of remote access software. This Initial Access Brokers Report analyzes this phenomenon and what it means for security practitioners.

    Read Report
  • Weekly: More on Microsoft and Acer Receives $50 Million in Ransom Demands

    Weekly: More on Microsoft and Acer Receives $50 Million in Ransom Demands

    ShadowTalk hosts Alec, Austin, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 26 March

    Weekly Intelligence Summary 26 March

    The new Internet of Things (IoT) botnet ZHtrap has been turning devices it has infected into honeypots, in a novel technique that highlights yet another risk presented by exposed IoT devices.

    Read Report
  • Check out our Weekly Intelligence Summary

    Access Here
  • Weekly: Ransomware Resurgence - The Return of FIN8, DarkSide, and More!

    Weekly: Ransomware Resurgence - The Return of FIN8, DarkSide, and More!

    ShadowTalk hosts Stefano, Adam, Kim, and first-timer Chris bring you the latest in threat intelligence.

    Read Post
  • Weekly Intelligence Summary 19 March

    Weekly Intelligence Summary 19 March

    Four zero-day vulnerabilities in Microsoft Exchange Servers have been linked to more than 30,000 cyber attacks taking place in the week following their discovery.

    Read Report
  • Threat Intelligence Can Be Noisy: SearchLight Helps

    Threat Intelligence Can Be Noisy: SearchLight Helps

    Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence ...

    Read Post
  • Weekly: Supply Chain Compromise Round-Up - Microsoft, Verkada, and More!

    Weekly: Supply Chain Compromise Round-Up - Microsoft, Verkada, and More!

    ShadowTalk hosts Alec, Ivan, Charles, and Austin bring you the latest in threat intelligence. This week they cover: - The team discuss HAFNIUM and Microsoft Servers Exchange - Updates on the...

    Read Post
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Weekly Intelligence Summary 12 March

    Weekly Intelligence Summary 12 March

    A new round of software attacks has raised another red flag concerning supply-chain security and the prevalence of third-party supply-chain targeting.

    Read Report
  • loading
    Loading More...