With over 1,442 cryptocurrencies in circulation, and new alternative coins – “altcoins” – emerging every week, cybercriminals have developed several schemes to defraud those looking to profit from the growth in cryptocurrencies.
Register to Continue Reading
Cryptojacking is the process of hijacking someone else’s browser to mine cryptocurrencies with their comput...
Other content in this Stream
Note: This blog is a follow-up on our remote worker series on navigating security as organizations continue to work from ...
Initial access brokers are benefitting from a rise in adoption of remote access software. This Initial Access Brokers Report analyzes this phenomenon and what it means for security practitioners.
ShadowTalk hosts Kacey, Alec, Charles, and Rick bring you the latest in threat intel.
ShadowTalk hosts Viktoria and James talk to special guest Geoff about his best selling book Crime Dot Com.
This week it’s a full house with ShadowTalk hosts Alex, Kacey, Charles, Alec and Rick.
Over the past 2.5 years, we have been analyzing how cybercriminals conspire to prey upon users of online services by “taking over” the accounts they all use...
This week’s ShadowTalk hosts Adam, Demi, Stefano and Kim discuss the latest threat intelligence stories.
Join the Photon team to learn about our latest research on account takeover.
This week’s ShadowTalk hosts Alex, Kacey, and Alec discuss the latest threat intelligence stories.
Digital Shadows team Viktoria, Demelza, Adam and Stefano host this week's podcast.
CISO Rick Holland and Host Alex Guirakhoo chat with this week's special guest Tom Schmitt, Global Director of Threat Intelligence at Anheuser-Busch InBev.
Alex, Kacey, Charles and Rick host this week’s ShadowTalk to bring you the latest threat intelligence stories.
In this webinar, Alex and Kacey cover dark web trends that we have recently observed, the risk impact associated with cybercriminal behaviors, and mitigation strategies for your organization.
Demelza, Viktoria, Adam, and Stefano host this week’s ShadowTalk to bring you the latest threat intelligence stories from the week.
This blog examines a newly launched DDoS protection filter mechanism dubbed EndGame advertised last week on the dark web community ...
Alex is joined by Kacey and Charles this week to chat through the top threat intel stories of the week. This week’s highlights include Zorab Ransomware Disguised as STOP Djvu Ransomware...
A couple of weeks ago, the United States Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation ...
Pietro, Viktoria, Adam, and Demelza cover this week’s top threat intelligence stories, including a Hacktivist group choosing destruction over profit with ransomware.
Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has
Sadly, Marvel’s Black Widow release date was pushed back as a result of COVID19, but thankfully the 2020 Verizon Data ...