See how one global retailer detected almost 2,000 domains impersonating their brand.
This practical guide provides advice to help understand how to identify critical business assets, understan...
Other content in this Stream
Legal firms can be attractive targets for cybercriminals. This is especially true for those firms working on mergers and acquisitions, where they possess a lot of sensitive, non-public information.
Digital Shadows helped a regional law firm discover key employee details exposed online for its Chief Counsel - including family names and home addresses.
APT37 re-emerges, exploits cloud for espionage
Coming to you from Dallas this week - we have Kacey, Harrison, Alex, and Charles. This week the team talks through third party app risks as they relate to COVID-19, as well as touch on security...
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can ...
On Monday, January 13th, Brian Krebs reported that Microsoft would be releasing “a software update on Tuesday to fix ...
VIPs and executives who are critical to your company and brand can be targeted by threat actors or groups who ...
Unless you went very dark for an extended holiday break, you are no doubt very well aware of the United ...
we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat
In this blog, we discuss several significant trends and events that have helped shape the cyber threat landscape, all of which will almost certainly continue through 2020.
Hear from Becky Pinkard, VP of Intel & IT at Digital Shadows, on Security & Privacy in this on-demand webinar.
This blog seeks to rebalance intelligence tradecraft discussions by highlighting some of the less glamorous everyday sources of bias that are too often overlooked.
We took a deep-dive into the cybercriminal underground to investigate the persistence of forums, uncovering several reasons they remain attractive amid appealing alternatives.
It seems like we read about new breaches every day. What’s changing? How is exposure and the adoption of digital technology changing the breach landscape? We have a special two-part series where Rick
Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a ...
Part 2 looks at cybercriminal forum users’ resistance to moving away from the forum model.
The survival of the cybercriminal forum in the face of new, more secure technologies and constant pressure from law enforcement does not come as a surprise to researchers at Digital Shadows.
When the attacker, Andrei Tyurin, pleaded guilty, we thought we could look at the attacker goals, their TTPs and map this to the Mitre PRE-ATT&CK and ATT&CK framework.
We’re all familiar with forums and marketplaces (we use them in our daily lives – think Reddit, eBay, or Amazon, for example), but what exactly is an AVC? What do they look like?