We recently worked with a bank that was in the process of moving their support channels to their website and social media. They turned to Digital Shadows to ensure their brand was not being misappropriated on social media, as they had received reports of fake support targeting customers on Twitter.
Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digita...
Other content in this Stream
This guide outlines how to detect, analyze, and remediate data leakage–including a treasure chest of free tooling.
This Solutions Guide to learn how to protect your organizations social footprint with the top Social Media Monitoring use cases Digital Shadows has identified.
As the leader in threat intel and drp SearchLight is the most comprehensive and awarded solution available. Ready to learn a better way to tackle Threat Intelligence? Get started today!
ShadowTalk hosts Sean, Alec, Rick, and Ivan bring you the latest in threat intelligence. They cover CISA guidelines on frequently exploited vulnerabilities , Q2 Ransomware and PunkSpider.
In this report, Digital Shadows’ Photon Team analyzed a data set of more than 175,000 impersonating domains raised to our clients over four months of 2021.
This guide outlines what potential data sources, detection methods, context, and remediation actions to consider if you want to effectively monitor domains and mitigate the risk of data loss, exposed
This infographic details the two high level types of domain impersonation: typosquats and combosquats, and the 10 different strategies used by threat actors.
ShadowTalk hosts Sean, Ivan, and Charles bring you the latest in threat intelligence.
ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence.
US President Joe Biden recently signed an executive order (EO) aimed at strengthening network security for US federal government departments, and agencies and contractors working with them.
This guide shares years of operational best practices and expands on where dark web intelligence is useful and can be effectively leveraged into action for security teams.
ShadowTalk hosts Sean, Alec, Ivan, and Charles bring you the latest in threat intelligence.
A “Conti” ransomware attack on Ireland’s healthcare system, the Health Service Executive (HSE), significantly delayed the delivery of medical laboratory results and affected many outpatient services.
ShadowTalk hosts Stefano, Chris, Kim, and Xue bring you the latest in threat intelligence.
Colonial Pipeline Company fell victim to a cyber attack that resulted in 5,500 miles of its US fuel pipelines being shut down, causing public distress and fears of fuel shortages.