SearchLight’s Exposed Document Alerts: Uncover the Critical, Faster
BACKING UP…INTO A DITCH I am a terrible driver. While I’ve sat through Driver’s Ed courses, studied physics and trigonometry, ...
Read Post
WEEKLY: COVID-19 Third Party App Risks, Zoom, And DarkHotel Hackers
Coming to you from Dallas this week - we have Kacey, Harrison, Alex, and Charles. This week the team talks through third party app risks as they relate to COVID-19, as well as touch on security...
Read Post
Third Party Risk: 4 ways to manage your security ecosystem
Don’t assume your data is safe because you’ve completed a vendor risk questionnaire, or the third-party has a promising risk score. Data finds a way online. Find a way to detect it when it does.
Read Post
NSA Vulnerability Disclosure: Pros and Cons
On Monday, January 13th, Brian Krebs reported that Microsoft would be releasing “a software update on Tuesday to fix ...
Read Post
Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online
VIPs and executives who are critical to your company and brand can be targeted by threat actors or groups who ...
Read Post
Iranian Cyber Threats: Practical Advice for Security Professionals
Unless you went very dark for an extended holiday break, you are no doubt very well aware of the United ...
Read Post
Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground
we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat
Read Post
2020 Cybersecurity Forecasts: 5 trends and predictions for the new year
In this blog, we discuss several significant trends and events that have helped shape the cyber threat landscape, all of which will almost certainly continue through 2020.
Read Post
Security and Privacy: How to grow the relationship
Hear from Becky Pinkard, VP of Intel & IT at Digital Shadows, on Security & Privacy in this on-demand webinar.
Read Post
A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias
This blog seeks to rebalance intelligence tradecraft discussions by highlighting some of the less glamorous everyday sources of bias that are too often overlooked.
Read Post
Threat Intelligence: A Deep Dive
Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a ...
Read Post
Forums are Forever – Part 2: Shaken, but not Stirred
Part 2 looks at cybercriminal forum users’ resistance to moving away from the forum model.
Read Post
Forums are Forever – Part 1: Cybercrime Never Dies
The survival of the cybercriminal forum in the face of new, more secure technologies and constant pressure from law enforcement does not come as a surprise to researchers at Digital Shadows.
Read Post
Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework
When the attacker, Andrei Tyurin, pleaded guilty, we thought we could look at the attacker goals, their TTPs and map this to the Mitre PRE-ATT&CK and ATT&CK framework.
Read Post
Understanding the Different Cybercriminal Platforms: AVCs, Marketplaces, and Forums
We’re all familiar with forums and marketplaces (we use them in our daily lives – think Reddit, eBay, or Amazon, for example), but what exactly is an AVC? What do they look like?
Read Post
Understanding the Consequences of Data Leakage through History
One of the most interesting aspects of transitioning from high school history teacher to cyber threat intelligence professional is the ...
Read Post