Digital Shadows is not a noisy feed of threat data. By mapping our service to the Intelligence Cycle, Digital Shadows ensures that customers receive the most tailored intelligence. This illustration will allow you to see what we do at each stage of the cycle to ensure we effectively answer stakeholder requirements.
Most Recent Flipbooks

A compilation of some of our favorite readings, resources, and tools that relate to Cyber Threat Intelligence.
Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 (aka coronavirus) has forced many organizations to accelerate their plans or create them on the fly.

Our team of researchers recently dug into the different popular dark web marketplaces to understand which marketplaces are gaining the most traction and what is being sold on these cybercriminal platf

Learn 18 reasons why your organization needs digital risk management in this infographic.

CISO Rick Holland shares how we have mapped SearchLight to the NIST Cybersecurity Framework.

We took our recent work on the Mitre ATT&CK framework and various indictments of cyber criminals and nation state actors and mapped them to the Essential 8 framework.

Here are 5 ways that cybercriminals gain access to emails without conducting a phishing campaign or network intrusion.

As with our previous work on the GRU, FIN7, and North Korean indictments, we’ve used the Mitre ATT&CK™ framework to play back the findings from the indictment.

On 6th September the US Department of Justice (DOJ) unsealed an indictment against a North Korean regime-backed programmer who is a suspect in many significant network intrusions.

we have used the MITRE ATT&CK™ framework as our methodology to play back the findings of the indictment. In doing so, we aim to provide key lessons organizations can take away from this indictment.

Heading to a conference? Make sure to stay secure with these tips from our security team.