A pro-Russia trolling campaign has reportedly targeted 32 European media outlets, including mainstream news websites. Incendiary comments were posted alongside online media stories, in conversation threads that were then manipulated to further spread disinformation to Russian readers. The effort was aided by a network of Russian media outlets, social-media feeds, and fringe-media websites. The campaign offers a useful insight into the potential for developing and circulating disinformation and propaganda, and how easily they can infiltrate online news content. The lack of restrictions to create new user accounts should sound an alarm to social-media and news outlets alike. Until more stringent measures are taken, similar coordinated disinformation campaigns will likely surface, and almost certainly influence public opinion.
This episode covers newly detected NOBELIUM malware creates persistent backdoor, four individuals charged w...
Other content in this Stream
Ryan Floyd, venture capitalist and co-founder Storm Ventures, talks about the latest cybersecurity threats you should be aware of with Digital Shadows CEO, Alastair Paterson.
This guide outlines how to detect, analyze, and remediate data leakage–including a treasure chest of free tooling.
In this report, Digital Shadows’ Photon Team analyzed a data set of more than 175,000 impersonating domains raised to our clients over four months of 2021.
This episode of ShadowTalk covers a REvil rep death, Q3 Ransomware trends, and the BlackMatter CISA advisory.
We have reached the end of another quarter, and it is time again for us to have a look back ...
This Solutions Guide to learn how to protect your organizations social footprint with the top Social Media Monitoring use cases Digital Shadows has identified.
As the leader in threat intel and drp SearchLight is the most comprehensive and awarded solution available. Ready to learn a better way to tackle Threat Intelligence? Get started today!
This infographic details the two high level types of domain impersonation: typosquats and combosquats, and the 10 different strategies used by threat actors.
This blog sheds light on some of the lesser-known tactics used in phishing campaigns. Knowing more about the different tactics cybercriminals use will make you better equipped to Fight the Phish!
This guide outlines what potential data sources, detection methods, context, and remediation actions to consider if you want to effectively monitor domains and mitigate the risk of data loss, exposed
Third party risk is the process of managing risks introduced by suppliers and third parties, often specifically to sensitive data and customer information.
This guide outlines best practices for cyber threat intelligence and features resources to leverage when developing or improving your organization's cyber threat intelligence capabilities.
This episode they covers: FIN12 targets healthcare sector, Google targeted by APT phishing campaign, and a US Official resign over US-Chinese AI & cybersecurity difference.
Being cyber smart is more than simply patching vulnerabilities, using strong passwords, and your usual cyber security best practices. It is also about the little things.
Initial access brokers are benefitting from a rise in adoption of remote access software. This Initial Access Brokers Report analyzes this phenomenon and what it means for security practitioners.
This ShadowTalk covers the Twitch hack, Facebook takes a day off, Ransomware roundup - revelations from REvil, LockBit, and Conti, and the Pandora Papers release.
This guide draws from best practices suggested in SearchLight’s playbooks, so security professionals can improve their tools and processes to prevent employee account takeover.