There is good and bad news around cybersecurity these days. The good news is that many CEOs and corporate boards no longer accept “good enough” security, and are willing to invest in best practices and leading security defenses to protect their organizations. So what’s the bad news? Many organizations continue to think of cyber-risk in terms of internal network penetration rather than as a more comprehensive strategy that includes all digital assets - websites, social networks, VIP and third-party partner exposure, etc. To address these risks, CISOs and risk officers must adopt a thorough digital risk management strategy that includes monitoring, filtering, prioritizing, and responding to threats across the public Internet and dark web. Digital Shadows specializes in this area and can help organizations with digital risk mitigation.
The State of Cybercrime in the Post-AlphaBay and Hansa Age
Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.
Error - something went wrong!
Other content in this Stream
Top Cyber Threats to the Legal Sector
Legal firms can be attractive targets for cybercriminals. This is especially true for those firms working on mergers and acquisitions, where they possess a lot of sensitive, non-public information.
Law Firm Uncovers Sensitive Executive Details Online
Digital Shadows helped a regional law firm discover key employee details exposed online for its Chief Counsel - including family names and home addresses.
Weekly Intelligence Summary 17 Jan 2020
The cyber-extortion landscape has shown real signs of strength and advancement in the past three months...
NSA Vulnerability Disclosure, Ransomware News, And Iran Updates
Kacey, Charles, Alex, and Harrison host this week’s threat intelligence update from Dallas. We kick off with vulnerabilities from the week. This includes both the NSA CVE and Citrix CVE. The team...
Third Party Risk: 4 ways to manage your security ecosystem
The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can ...
NSA Vulnerability Disclosure: Pros and Cons
On Monday, January 13th, Brian Krebs reported that Microsoft would be releasing “a software update on Tuesday to fix ...
Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online
VIPs and executives who are critical to your company and brand can be targeted by threat actors or groups who ...
Digital Risk Protection: Forrester New Wave Report
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
Iranian Cyber Threats: Practical Advice for Security Professionals
Unless you went very dark for an extended holiday break, you are no doubt very well aware of the United ...
Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground
we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat
2020 Cybersecurity Forecasts: 5 trends and predictions for the new year
In this blog, we discuss several significant trends and events that have helped shape the cyber threat landscape, all of which will almost certainly continue through 2020.
Security and Privacy: How to grow the relationship
Hear from Becky Pinkard, VP of Intel & IT at Digital Shadows, on Security & Privacy in this on-demand webinar.
A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias
This blog seeks to rebalance intelligence tradecraft discussions by highlighting some of the less glamorous everyday sources of bias that are too often overlooked.
The Modern Cybercriminal Forum
We took a deep-dive into the cybercriminal underground to investigate the persistence of forums, uncovering several reasons they remain attractive amid appealing alternatives.
Breach! Exploring the Modern Digital Breach: Part 1
It seems like we read about new breaches every day. What’s changing? How is exposure and the adoption of digital technology changing the breach landscape? We have a special two-part series where Rick
Threat Intelligence: A Deep Dive
Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a ...
Forums are Forever – Part 2: Shaken, but not Stirred
Part 2 looks at cybercriminal forum users’ resistance to moving away from the forum model.
Forums are Forever – Part 1: Cybercrime Never Dies
The survival of the cybercriminal forum in the face of new, more secure technologies and constant pressure from law enforcement does not come as a surprise to researchers at Digital Shadows.
Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework
When the attacker, Andrei Tyurin, pleaded guilty, we thought we could look at the attacker goals, their TTPs and map this to the Mitre PRE-ATT&CK and ATT&CK framework.
Understanding the Different Cybercriminal Platforms: AVCs, Marketplaces, and Forums