Photon Research Team

Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the threats organizations face from cyber criminals and accidental data exposure.

  • Digital Shadows Photon Research Team2:55

    Digital Shadows Photon Research Team

    Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the

    Watch Video
  • Purple Teaming: An Interview With Eliza May Austin

    Purple Teaming: An Interview With Eliza May Austin

    In this episode, Viktoria interviews Eliza May Austin (CEO & Co-Founder of th4ts3cur1ty.company), and our own Richard Gold and James Chappell on Purple Teaming.

    Read Post
  • Follow us on Twitter (@photon_research)

    Follow Us
  • Two-Factor in Review

    Two-Factor in Review

    A technical assessment of the most popular mitigation for account takeover attacks

    Read Report
  • The Account Takeover Kill Chain: A Five Step Analysis

    The Account Takeover Kill Chain: A Five Step Analysis

    Here, we review account takeover from the perspective of the cybercriminal: why and how do cybercriminals perform ATO?

    Read Post
  • Weekly Intelligence Summary 05 Sep - 12 Sep 2019

    Weekly Intelligence Summary 05 Sep - 12 Sep 2019

    In the spotlight this week: Following reports that “APT3” used Equation Group tools prior to their public leak by the “Shadow Brokers” in 2016, cyber security researchers have provided additional ...

    Read Report
  • Have you heard our ShadowTalk Podcast?

    Subscribe Here
  • Metasploit Project Publishes Exploit For Bluekeep, plus APT3 and Silence Cybercrime Group Updates

    Metasploit Project Publishes Exploit For Bluekeep, plus APT3 and Silence Cybercrime Group Updates

    Viktoria Austin is joined by Adam Cook and Phil Dohetry this week in the London office to talk about the top story this week: Metasploit Project publishes exploit for Bluekeep bug.

    Read Post
  • Dark Web Monitoring: The Good, The Bad, and The Ugly

    Dark Web Monitoring: The Good, The Bad, and The Ugly

    Gaining access to dark web and deep web sources can be extremely powerful – if you focus on relevant use cases. The most successful strategies we observe have clear requirements, such as fraud detecti

    Read Post
  • Envoy on a Mission to Bring Stability to the Criminal Underground

    Envoy on a Mission to Bring Stability to the Criminal Underground

    All this turbulence has resulted in significant disruption and unrest within the overall cybercriminal scene and, in particular, has left a vacuum for English-language forums. It’s within this context

    Read Post
  • More Sodinokibi Activity, Imperva Breach, And Weirdest Food At The Texas State Fair

    More Sodinokibi Activity, Imperva Breach, And Weirdest Food At The Texas State Fair

    Rick Holland and Alex Guirakhoo join Harrison Van Riper this week to talk through more Sodinokibi activity. Just yesterday, a cloud hosting provider for Digital Dental Records was hit with...

    Read Post
  • Black Hat and DEFCON 2019 – Some of our Favorite Sessions

    Black Hat and DEFCON 2019 – Some of our Favorite Sessions

    The team were fortunate to go to Black Hat and DEFCON this year, and we wanted to share back some ...

    Read Post
  • Weekly Intelligence Summary

    Access Here
  • Fresh blow for dark web markets: Nightmare market in disarray

    Fresh blow for dark web markets: Nightmare market in disarray

    Over the past three weeks, Digital Shadows has observed another popular dark web criminal market – Nightmare – experience several ...

    Read Post
  • Recon Village: Panning for gold

    Recon Village: Panning for gold

    Richard will be presenting ‘Asset Discovery: Making Sense of the Ocean of OSINT’ at 13.50 on 9th August 2019 in ...

    Read Post
  • The Nouns of Black Hat: People, Places, and Things From Summer Camp 2019

    The Nouns of Black Hat: People, Places, and Things From Summer Camp 2019

    Black Hat and DEFCON are a wrap! Digital Shadows was there in a big way this year and it was ...

    Read Post
  • Too Much Information: The Sequel | New Research

    Too Much Information: The Sequel | New Research

    There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.

    Read Report
  • Your Data at Risk – Emerging Cyber Threats to Your Enterprise with the FBI Cyber Division56:13

    Your Data at Risk – Emerging Cyber Threats to Your Enterprise with the FBI Cyber Division

    The first half of 2019 has revealed no ebb in the number of massive data breaches and cybersecurity disasters. As the threat landscape continues to evolve and unfortunate enterprises have become the v

    Watch Video
  • Capital One Breach: What we know and what you can do

    Capital One Breach: What we know and what you can do

    Monday blues. It’s a thing. It’s when you start the week feeling moody because your weekend is over. The feeling ...

    Read Post
  • Capital One Breach, Ransomware Trends, and Threat Actors

    Capital One Breach, Ransomware Trends, and Threat Actors

    Move out of the way, Harrison! We have a brand new host this week: Viktoria Austin, Strategy and Research Analyst, and Photon Research Team member. Viktoria is joined this week by Rose Bernard and...

    Read Post
  • The CyberWire Daily Podcast: Too Much Information: The Sequel

    The CyberWire Daily Podcast: Too Much Information: The Sequel

    Tamika Smith speaks with Harrison Van Riper from Digital Shadows aboutour recent report, “Too Much Information: The Sequel,” outlining the increase in data exposure over the past year.

    Read Post
  • Dark Web Typosquatting: Scammers v. Tor

    Dark Web Typosquatting: Scammers v. Tor

    Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can ...

    Read Post
  • 2FA - Advice For Deployment & A Technical Assessment

    2FA - Advice For Deployment & A Technical Assessment

    Thinking about deploying 2FA? In this special interview, our Head of Cyber Security & IT, Craig Ellis, and our Head of Security Engineering, Dr. Richard Gold, chat with Harrison around how they...

    Read Post
  • loading
    Loading More...