Photon Research Team

Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the threats organizations face from cyber criminals and accidental data exposure.

  • Too Much Information: The Sequel | New Research

    Too Much Information: The Sequel | New Research

    There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.

    Read Report
  • Digital Shadows Photon Research Team2:55

    Digital Shadows Photon Research Team

    Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the

    Watch Video
  • Follow us on Twitter (@photon_research)

    Follow Us
  • The CyberWire Daily Podcast: Too Much Information: The Sequel

    The CyberWire Daily Podcast: Too Much Information: The Sequel

    Tamika Smith speaks with Harrison Van Riper from Digital Shadows aboutour recent report, “Too Much Information: The Sequel,” outlining the increase in data exposure over the past year.

    Read Post
  • Leaky SMB File Shares – So Many Bytes!

    Leaky SMB File Shares – So Many Bytes!

    Everyone loves a sequel. If you’re an avid Marvel fan, you’re probably sitting on the edge of your seat waiting ...

    Read Post
  • Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity

    Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity

    This week Alex and Jamie (@TheCollierJam) chat with Harrison (@pseudohvr) on a cyber-threat campaign involving the abuse of legitimate features in Google Calendar. Then they dive into other...

    Read Post
  • FBI IC3: Cybercrime Surges in 2018, Causing $2.7 Billion in Losses

    FBI IC3: Cybercrime Surges in 2018, Causing $2.7 Billion in Losses

    This week, the Federal Bureau of Investigation released its 2018 Internet Crime Complaints Center (IC3). In 2018, the IC3 responded ...

    Read Post
  • Predator: Modeling the attacker’s mindset

    Predator: Modeling the attacker’s mindset

    Author: Richard Gold  The phrases “attacker’s mindset” or “think like an attacker” are often used in cyber security to encourage ...

    Read Post
  • Subscribe to ShadowTalk on iTunes!

    Subscribe Now
  • Dark Web Typosquatting: Scammers v. Tor

    Dark Web Typosquatting: Scammers v. Tor

    Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can ...

    Read Post
  • A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.

    Read Report
  • Easing into the extortion game

    Easing into the extortion game

    One of the main ideas which flowed through Photon’s most recent research report, A Tale of Epic Extortions, was that cyber ...

    Read Post
  • Weekly Intelligence Summary

    Access Here
  • Cyber Risks and High-frequency Trading: Conversation with an Insider

    Cyber Risks and High-frequency Trading: Conversation with an Insider

    Research from the Carnegie Endowment for International Peace published this week focused the attention on how financial systems around the ...

    Read Post
  • Episode 59: Practitioner’s Guide to Email Spoofing

    Episode 59: Practitioner’s Guide to Email Spoofing

    Senior security engineer, Simon Hall joins Rafael Amado to explain how IT teams and defenders can combat email spoofing, one of the most popular techniques used by phishers. Simon discusses why...

    Read Post
  • How to Reduce Your Extortion Risks: Avoiding the Shakedown44:53

    How to Reduce Your Extortion Risks: Avoiding the Shakedown

    In this webinar we will cover recent sextortion tactics, thedarkoverlord, and SamSam Group campaigns to demonstrate how the barriers to entry for extortionists are decreasing, and how businesses can r

    Watch Video
  • Purple Teaming with Vectr, Cobalt Strike, and MITRE ATT&CK™

    Purple Teaming with Vectr, Cobalt Strike, and MITRE ATT&CK™

    Authors: Simon Hall, Isidoros Monogioudis   Here at Digital Shadows we perform regular purple team exercises to continually challenge and ...

    Read Post
  • SamSam But Different: MITRE ATT&CK and the SamSam Group Indictment

    SamSam But Different: MITRE ATT&CK and the SamSam Group Indictment

    In our latest research report, A Tale of Epic Extortions, the Digital Shadows Photon Research Team highlight how cybercriminals abuse our ...

    Read Post
  • Extortion Exposed: Sextortion, thedarkoverlord, and SamSam

    Extortion Exposed: Sextortion, thedarkoverlord, and SamSam

    In our most recent research, A Tale of Epic Extortions, the Digital Shadows Photon Research Team approached the topic of ...

    Read Post
  • Photon Research Team Shines Light On Digital Risks

    Photon Research Team Shines Light On Digital Risks

    I’m very excited to announce the launch of the Digital Shadows’ Photon Research Team. We have decided to bolster our ...

    Read Post
  • SamSam and Mitre ATT&CK

    SamSam and Mitre ATT&CK

    Read Report
  • Security Practitioner’s Guide to Email Spoofing and Risk Reduction

    Security Practitioner’s Guide to Email Spoofing and Risk Reduction

    In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we ...

    Read Post
  • Weekly Intelligence Summary: Ep 9

    Weekly Intelligence Summary: Ep 9

    In this week’s episode, the team looks at Fin6, who has begun regularly targeting card-not-present data on e-commerce websites. Other highlights from this week include Topps disclosing a data...

    Read Post
  • loading
    Loading More...