In this O’Reilly report, authors Greg Fell and Mike Barlow explore both the benign and malevolent activities of the dark net, and the dark web, to explain the surprising origin of the dark net, how criminals use the dark net to steal and store vital information, and how you can patrol this not-so-secret domain to detect and thwart intruders.
Error - something went wrong!
Digital Shadows Managed Takedown Service
Our Managed Takedown Service provides customers end-to-end management of submitting, chasing, and confirmin...
Error - something went wrong!
Other content in this Stream
Digital Shadows Company Overview Video
Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.
[On Demand Webinar] FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar
Hear from the FBI Cyber Division’s leading ransomware investigator about the latest threats and vectors and gain insight into how to protect your organization.
Cryptocurrency - The New Gold Rush for Cybercriminals
Cybercriminals have developed several schemes to defraud those looking to profit from the growth in cryptocurrencies.
Episode 12: Tax Fraud, AMD Vulnerability, Slingshot Targets Mikrotik Routers, And Hermes Ransomware
This week’s Shadow Talk outlines the latest techniques in tax return fraud, claimed vulnerabilities in AMD chips, Slingshot malware targeting Mikrotik routers, and Greenflash Sundown Exploit Kit...
Digital Shadows Overview
Digital Shadows monitors and manages an organization’s digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web.
[On Demand Webinar] Protecting Brands from Digital Risks and the Dark Web
Watch this on demand webinar to learn how to identify and eliminate counterfeit digital sites, social media, and apps and how to identify and mitigate threats from the dark web.
GDPR Data Loss Assessment
Learn the benefits of the Digital Shadows GDPR Data Loss Assessment. We aim to help organizations get ahead of EU citizens reporting issues to regulators.
It’s Accrual World: Tax Return Fraud in 2018
With just over a month until Tax Deadline Day, individuals are scrambling to get their tax returns submitted. This is ...
Digital Shadows - Monitor, Manage, and Remediate Your Digital Risk
See how Digital Shadows monitors, manages, and remediates digital risk across the widest range of data sources within the open, deep, and dark web.
Anonymous and the New Face of Hacktivism: What to Look Out For in 2018
The Anonymous collective has been the face of activism since 2008. Since then, the group’s membership, operations, and structure have ...
Advice from the Board: All Companies Should Require Digital Risk Management to Mitigate Corporate Risk
Rob Theis of World Innovation Lab dives into why companies must take digital risk seriously.
Phishing Site Detected and Taken Down
An IT manager of a multinational financial services holding company involved in Investment Banking, Private Banking, and Asset Management discovered a phishing site impersonating their brand.
The Business of Disinformation: A Taxonomy
The availability of tools found by Digital Shadows research team means that barriers to entry are lower than ever.
6 Considerations When Purchasing Threat Intelligence
When selecting the optimal CTI solution for your organization, buyers should use CARTER as a guide to assess threat intelligence providers across six critical categories.
Inside Online Carding Courses Designed for Cybercriminals
Digital Shadows lifts the lid on sophisticated Russian language e-learning credit card fraud courses.
The Path to GDPR Compliance
Are you ready? In May 2018, the European Union's new General Data Protection Regulation comes into force. Learn how to become compliant before then.
[On Demand Webinar] Cryptocurrency Fraud
Cybercriminals have developed several schemes to defraud those looking to profit from the growth in cryptocurrencies. Our research analysts discuss in this webinar.
[On Demand Webinar] Best Practices for Data Breach Response with Experian
Organizations must not only defend against breaches, but ensure they have the people, process, and technology needed to respond to breaches in a compliant manner.
[On Demand Webinar] Countdown to GDPR On Demand Webinar - Forget the Hype, Reality Bites
Legal Cyber experts at Mishcon De Reya and Digital Shadows Data Loss Technology team discuss key obligations required by GDPR and practical steps to take now to become compliant by May.
Why Marketing Leaders Must Take Action To Manage Digital Risk and Protect Their Brand