Legal Services

See how Digital Shadows helps manage digital risks for Legal Services companies.

  • Top Cyber Threats to the Legal Sector

    Top Cyber Threats to the Legal Sector

    Legal firms can be attractive targets for cybercriminals. This is especially true for those firms working on mergers and acquisitions, where they possess a lot of sensitive, non-public information.

    Read Report
  • Resources for Your Team during the Coronavirus Pandemic

    Take Me There
  • Law Firm Uncovers Sensitive Executive Details Online

    Law Firm Uncovers Sensitive Executive Details Online

    Digital Shadows helped a regional law firm discover key employee details exposed online for its Chief Counsel - including family names and home addresses.

    Read Report
  • Weekly Intelligence Summary 10 Apr 2020

    Weekly Intelligence Summary 10 Apr 2020

    APT37 re-emerges, exploits cloud for espionage

    Read Report
  • WEEKLY: COVID-19 Third Party App Risks, Zoom, And DarkHotel Hackers

    WEEKLY: COVID-19 Third Party App Risks, Zoom, And DarkHotel Hackers

    Coming to you from Dallas this week - we have Kacey, Harrison, Alex, and Charles. This week the team talks through third party app risks as they relate to COVID-19, as well as touch on security...

    Read Post
  • Digital Risk Protection: Forrester New Wave Report

    Digital Risk Protection: Forrester New Wave Report

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Third Party Risk: 4 ways to manage your security ecosystem

    Third Party Risk: 4 ways to manage your security ecosystem

      The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can ...

    Read Post
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Discover why we’re named a "Leader" in Digital Risk Protection

    Forrester Report
  • NSA Vulnerability Disclosure: Pros and Cons

    NSA Vulnerability Disclosure: Pros and Cons

      On Monday, January 13th, Brian Krebs reported that Microsoft would be releasing “a software update on Tuesday to fix ...

    Read Post
  • Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online

    Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online

    VIPs and executives who are critical to your company and brand can be targeted by threat actors or groups who ...

    Read Post
  • Iranian Cyber Threats: Practical Advice for Security Professionals

    Iranian Cyber Threats: Practical Advice for Security Professionals

    Unless you went very dark for an extended holiday break, you are no doubt very well aware of the United ...

    Read Post
  • Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat

    Read Post
  • 2020 Cybersecurity Forecasts: 5 trends and predictions for the new year

    2020 Cybersecurity Forecasts: 5 trends and predictions for the new year

    In this blog, we discuss several significant trends and events that have helped shape the cyber threat landscape, all of which will almost certainly continue through 2020.

    Read Post
  • ×

    Request a
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • Security and Privacy: How to grow the relationship

    Security and Privacy: How to grow the relationship

    Hear from Becky Pinkard, VP of Intel & IT at Digital Shadows, on Security & Privacy in this on-demand webinar.

    Read Post
  • A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias

    A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias

    This blog seeks to rebalance intelligence tradecraft discussions by highlighting some of the less glamorous everyday sources of bias that are too often overlooked.

    Read Post
  • The Modern Cybercriminal Forum

    The Modern Cybercriminal Forum

    We took a deep-dive into the cybercriminal underground to investigate the persistence of forums, uncovering several reasons they remain attractive amid appealing alternatives.

    Read Report
  • Breach! Exploring the Modern Digital Breach: Part 129:00

    Breach! Exploring the Modern Digital Breach: Part 1

    It seems like we read about new breaches every day. What’s changing? How is exposure and the adoption of digital technology changing the breach landscape? We have a special two-part series where Rick

    Watch Video
  • Threat Intelligence: A Deep Dive

    Threat Intelligence: A Deep Dive

      Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a ...

    Read Post
  • Forums are Forever – Part 2: Shaken, but not Stirred

    Forums are Forever – Part 2: Shaken, but not Stirred

    Part 2 looks at cybercriminal forum users’ resistance to moving away from the forum model.

    Read Post
  • Forums are Forever – Part 1: Cybercrime Never Dies

    Forums are Forever – Part 1: Cybercrime Never Dies

    The survival of the cybercriminal forum in the face of new, more secure technologies and constant pressure from law enforcement does not come as a surprise to researchers at Digital Shadows.

    Read Post
  • Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework

    Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework

    When the attacker, Andrei Tyurin, pleaded guilty, we thought we could look at the attacker goals, their TTPs and map this to the Mitre PRE-ATT&CK and ATT&CK framework.

    Read Post
  • Understanding the Different Cybercriminal Platforms: AVCs, Marketplaces, and Forums

    Understanding the Different Cybercriminal Platforms: AVCs, Marketplaces, and Forums

    We’re all familiar with forums and marketplaces (we use them in our daily lives – think Reddit, eBay, or Amazon, for example), but what exactly is an AVC? What do they look like?

    Read Post
  • loading
    Loading More...