Initial Access Broker Blogs

Discover even more Initial Access Brokers coverage by Digital Shadows

  • Initial Access Brokers in 2021: An Ever Expanding Threat

    Initial Access Brokers in 2021: An Ever Expanding Threat

    To say that 2021 was a turbulent year for security teams would be a massive understatement. Last year, we observed ...

    Read Post
  • Cyber Threats to Education

    Cyber Threats to Education

    Universities and higher education institutions were some of the most popular targets in 2021. According to Microsoft, education is the ...

    Read Post
  • Latin American Financial Services: Sunny Climes and Cybercrimes

    Latin American Financial Services: Sunny Climes and Cybercrimes

    Few things make my eyes sparkle like talking about Latin America. Back in 2018, I had the privilege of being ...

    Read Post
  • The Patching Nightmare

    The Patching Nightmare

    Note: This blog is part of a three-blog series on Vulnerability Intelligence that accompanies the release of Digital Shadows’ latest ...

    Read Post
  • Initial Access Brokers in Q3 2021

    Initial Access Brokers in Q3 2021

    As the end of the year approaches, it’s time once again to look at the initial access broker (IAB) activity ...

    Read Post
  • Why CISOs and Executives Should Care About IABs

    Why CISOs and Executives Should Care About IABs

    Initial access brokers (IABs) are enablers of high-level cybercriminal activity. They identify weak points in their targets’ systems and networks, ...

    Read Post
  • Preventing Ransomware: Preventing the 300 at Thermopylae

    Preventing Ransomware: Preventing the 300 at Thermopylae

    Ransomware, Ransomware, Ransomware Unless you’ve been on a quiet sabbatical or otherwise offline and not watching the news for the ...

    Read Post
  • How Has Forum Life Adapted to the Recent Ransomware Ban?

    How Has Forum Life Adapted to the Recent Ransomware Ban?

    In mid-May 2021, multiple cybercriminal forums prohibited users from advertising ransomware and affiliated partnership programs. Law enforcement agencies worldwide have ...

    Read Post
  • Initial Access Brokers in Q2

    Initial Access Brokers in Q2

    Back in March 2021, Digital Shadows published a research report titled Initial Access Brokers: An Excess of Access, analyzing  more ...

    Read Post
  • On the Rise: Ransomware and the Legal Services Sector

    On the Rise: Ransomware and the Legal Services Sector

    Ransomware has continued to dominate the headlines, new attacks, new groups, new data leak sites, and new tactics. Quarter over ...

    Read Post
  • Creating Security-Aware Passwords

    Creating Security-Aware Passwords

    Note: This blog is an overview of password history and best practices for individuals in honor of World Password Day, ...

    Read Post
  • Initial Access Brokers Listings Increasing in 2021

    Initial Access Brokers Listings Increasing in 2021

    Since we first published our report Initial Access Brokers: An Excess of Access, Digital Shadows has continued to monitor this ...

    Read Post
  • How to Monitor Initial Access Broker Listings in SearchLight

    How to Monitor Initial Access Broker Listings in SearchLight

    By now, you might have caught wind of Photon’s new research on Initial Access Brokers (IABs). It’s a pretty awesome, ...

    Read Post
  • Mapping MITRE ATT&CK to Compromised RDP Sales

    Mapping MITRE ATT&CK to Compromised RDP Sales

    Digital Shadows recently published a free research paper titled Initial Access Brokers: An Excess of Access, outlining the emergence of ...

    Read Post
  • The Rise of Initial Access Brokers

    The Rise of Initial Access Brokers

    Over the course of 2020, Digital Shadows detected over 500 cybercriminals’ listings advertising network access across a multitude of industry ...

    Read Post
  • Not another ransomware blog: Initial access brokers and their role

    Not another ransomware blog: Initial access brokers and their role

    It’s hard to get very far in cyber threat intelligence without discussing ransomware.

    Read Post
  • loading
    Loading More...