Weekly: When Initial Access Brokers Attack
ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence.
Read Post
Weekly: Egregor Arrests, SIM-Swapping, and Oldsmar Updates!
ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence.
Read Post
Weekly: Ransomware Updates - CDPR Victimized, Ziggy’s End, and the Oldsmar Water Incident
ShadowTalk hosts Alec, Ivan, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence.
Read Post
Weekly: Lebanese Cedar, Nefilim Ghost Credentials, and More on SolarWinds and Emotet
ShadowTalk hosts Stefano, Adam, and Kim bring you the latest in threat intelligence.
Read Post
Weekly: Law Enforcement Wins the Week - The Fall of NetWalker and Emotet!
ShadowTalk hosts Alec, Charles, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence.
Read Post
Weekly: CISA Security Advisory, IObit Attack, and more SolarWinds!
ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence.
Read Post
Holiday Cybercrime: Krampus is in Town
In this blog, we explore how cybercriminals are taking advantage of not-so-cheery sales this holiday season. From carding methods to account sales, nothing is off-limits.
Read Post
Digital Shadows’ Top Five Blogs of 2020
We are here to go through the top five blogs of 2020—one for each quarter plus a bonus one to quickly recap why they (still) matter and be better prepared for the exciting new year in security.
Read Post
Impersonator Syndrome: Supply chain lures and COVID-19 cures
While we’ve reported on recent Q3 ransomware campaigns targeting the healthcare industry, a new campaign targeting COVID-19 vaccine supply chain partners has emerged.
Read Post
How Cybercriminals Answer “What do you do for a living?”
Have you ever wondered how cybercriminals explain their mysterious means of income to others? While not all threat actors’ illicit ...
Read Post
THE TOP 3 CYBERSECURITY THREATS IN THE MIDDLE EAST
Rising rates of cybercriminal activities occur as threat actors observe the flourishing economies in the Middle East.
Read Post