At Digital Shadows we monitor, manage, and remediate your organization’s digital risk to protect your business, brand, and reputation. Our flagship service, Digital Shadows SearchLight™, is a scalable data analysis platform, complimented with security analyst expertise, to ensure extensive coverage, tailored threat intelligence, and friction-less deployment.
A technical assessment of the most popular mitigation for account takeover attacks
Other content in this Stream
This guide shares years of operational best practices and expands on where dark web intelligence is useful and can be effectively leveraged into action for security teams.
ShadowTalk hosts Alec, Ivan, Sean, and Digital Shadows CISO, Rick, bring you the latest in threat intelligence.
Security researchers discovered two unrelated cyber-threat campaigns targeting Microsoft SharePoint.
This guide outlines best practices for cyber threat intelligence and features resources to leverage when developing or improving your organization's cyber threat intelligence capabilities.
ShadowTalk hosts Alec, Ivan, Charles, and newcomer, Sean, bring you the latest in threat intelligence.
The FBI made digital copies of malicious web-shells before removing them from hundreds of vulnerable servers in the US, without any warning to affected organizations.
ShadowTalk hosts Stefano, Adam, Kim, and Chris bring you the latest in threat intelligence.
A cyber-espionage campaign was found targeting the Vietnamese military and government, as well as other sectors and some entities in Thailand and Central Asia.
ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence.
A user of the cybercriminal forum RaidForums has offered 533 million records of Facebook user data for only a few US dollars.
ShadowTalk hosts Stefano, Dylan, Kim, and Chris bring you the latest in threat intelligence.
Insurance provider CNA Financial has announced it was targeted in a cyber attack, later confirmed as involving the newly identified “Phoenix Cryptolocker” ransomware.
Initial access brokers are benefitting from a rise in adoption of remote access software. This Initial Access Brokers Report analyzes this phenomenon and what it means for security practitioners.
ShadowTalk hosts Alec, Austin, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence.
The new Internet of Things (IoT) botnet ZHtrap has been turning devices it has infected into honeypots, in a novel technique that highlights yet another risk presented by exposed IoT devices.
ShadowTalk hosts Stefano, Adam, Kim, and first-timer Chris bring you the latest in threat intelligence.
Four zero-day vulnerabilities in Microsoft Exchange Servers have been linked to more than 30,000 cyber attacks taking place in the week following their discovery.
Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence ...
ShadowTalk hosts Alec, Ivan, Charles, and Austin bring you the latest in threat intelligence. This week they cover: - The team discuss HAFNIUM and Microsoft Servers Exchange - Updates on the...
A new round of software attacks has raised another red flag concerning supply-chain security and the prevalence of third-party supply-chain targeting.