The dark web continues to pose extremely dangerous threats as cyber criminals coordinate attacks and trade intelligence about your enterprise. Join us for us for an informative session on the 7 most prolific threats on the dark web and strategies to harden your defenses to prevent becoming a victim. During this event you’ll hear from two industry experts on strategies to mitigate these cyber risks to prevent a data breach. Resources Center: https://resources.digitalshadows.com/ Website: https://www.digitalshadows.com/ Subscribe to our Newsletter: https://info.digitalshadows.com/EmailSubscription-Podcast_Reg.html Twitter: https://twitter.com/digitalshadows Facebook: https://www.facebook.com/digitalshadows/ LinkedIn: https://www.linkedin.com/company/digital-shadows/
Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework
We took our recent work on the Mitre ATT&CK framework and various indictments of cyber criminals and na...
Error - something went wrong!
Other content in this Stream
A Practical Guide to Reducing Digital Risk
This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.
Digital Risk Protection 2018 Forrester New Wave
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
Detecting Exposed Credentials
See how one large bank detected more than 50,000 exposed credentials in 1 year.
Weekly Intelligence Summary 11 Apr - 18 Apr 2019
In the spotlight: An unidentified threat actor has obtained data from various personal Outlook, MSN, and Hotmail email accounts by compromising a Microsoft customer support account.
Dark Web Typosquatting: Scammers v. Tor
Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can ...
Detecting Spoof Domains - Domain Infringement
See how one global retailer detected almost 2,000 domains impersonating their brand.
Digital Risk Protection and Cyber Threat Intelligence
Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita
A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure
Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.
Weekly Intelligence Summary: Ep 15
This week the team discusses an unidentified threat actor that has obtained data from various personal Outlook, MSN, and Hotmail email accounts by compromising a Microsoft customer support...
Digital Shadows - Detecting Fake Social Media Profiles
See how a bank removed a spoof social media profiles targeting customers.
Weekly Intelligence Summary: Ep 14
Christian and Jamie join Harrison for another week of ShadowTalk to discuss the FIN6 threat actor reportedly widening its range of attacks to include ransomware, potentially inciting the threat...
Detecting Infrastructure Weaknesses - Open Ports
See how a technology company prevented a possible ransomware infection.
Reducing your attack surface
What is an attack surface According to OWASP, an attack surface “describes all of the different points where an attacker could ...
Predator: Modeling the attacker’s mindset
Author: Richard Gold The phrases “attacker’s mindset” or “think like an attacker” are often used in cyber security to encourage ...
Cyber Risk and the Shifting Regulatory Landscape: Recorded Webinar
The regulatory landscape is rapidly evolving and making it increasingly difficult to effectively respond to cyberattacks and data breaches in order to limit the damages. You’ll hear about the shifting
Weekly Intelligence Summary: Ep 13
Jamie, Alex and Zuko sit down with Harrison to talk about a story that flew a little under the radar this week; Russia has allegedly been conducting a widespread satellite spoofing campaign since...
Digital Shadows Company Overview Video
Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.
Easing into the extortion game
One of the main ideas which flowed through Photon’s most recent research report, A Tale of Epic Extortions, was that cyber ...
How to Secure Your Online Brand
What is online brand security? As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand ...
Detecting Exposed Company Data: The What, Why, and How