Physical Threats

Increasingly physical threats in the real world are organized, planned and publicized online.

  • Physical Threat

    Physical Threat

    Learn how Digital Shadows monitors, manages, and remediates physical threats to your business.

    Read Report
  • The Dark Web: Marketers’ Trick or Threat Intelligence Treat?

    The Dark Web: Marketers’ Trick or Threat Intelligence Treat?

    While the dark web is overhyped, it’s not all a load of hocus pocus. Nevertheless, you shouldn’t be waiting until data is offered for sale on the dark web – there’s plenty you can be doing to prev...

    Read Post
  • Digital Risk Protection 2018 Forrester New Wave

    Digital Risk Protection 2018 Forrester New Wave

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Episode 47: Ransomware Surges in October, Cathay Pacific Breach, and Triton Attributed

    Episode 47: Ransomware Surges in October, Cathay Pacific Breach, and Triton Attributed

    Harrison Van Riper and Rafael Amado join Michael Marriott to discuss the latest stories from the week. This week’s podcast has a strong Guy Richie flavor, with a focus on lock, stock and ru...

    Read Post
  • Resort’s Swimming Pool Control Panel Publicly Accessible Online

    Resort’s Swimming Pool Control Panel Publicly Accessible Online

    Digital Shadows helped the Incident Response Manager of a global resort company discover the control panel that controls all their swimming pools was openly accessibly online.

    Read Report
  • Read Full Report
  • Demystifying the Dark Web and Mitigating Risks1:03:52

    Demystifying the Dark Web and Mitigating Risks

    Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.

    Watch Video
  • ×

    Join 150k subscribers and get the latest news & threat intel in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • 5 Ways Cybercriminals Can Access Your Emails Without Phishing

    5 Ways Cybercriminals Can Access Your Emails Without Phishing

    Here are 5 ways that cybercriminals gain access to emails without conducting a phishing campaign or network intrusion.

    Read Report
  • The State of Cybercrime in the Post-AlphaBay and Hansa Age

    The State of Cybercrime in the Post-AlphaBay and Hansa Age

    Underground Marketplace model in decline as cybercriminals switch to chat channels to trade illegal goods.

    Read Report
  • How ADP Manages 3rd Party & Supply Chain Risk57:25

    How ADP Manages 3rd Party & Supply Chain Risk

    Recorded webcast with Guest Speaker V.Jay LaRosa from ADP discussing best practices mitigating cyber risks from complex service delivery ecosystems.

    Watch Video
  • Cyber Security Awareness Month: Week 3 – It’s Everyone’s Job to Ensure Online Safety at Work

    Cyber Security Awareness Month: Week 3 – It’s Everyone’s Job to Ensure Online Safety at Work

    This week, National Cyber Security Awareness Month (NCSAM) focuses on accountability and responsibility within the information security space: “It’s Everyone’s ...

    Read Post
  • Episode 45: FASTCash Hidden Cobra, MSP Risks, Five Eyes Tooling Report

    Episode 45: FASTCash Hidden Cobra, MSP Risks, Five Eyes Tooling Report

    Digital Shadows CISO Rick Holland, Dr Richard Gold and Simon Hall join Rafael Amado to cover the Hidden Cobra FASTCash campaign alert issued by US authorities, detailing ATM cash out campaigns...

    Read Post
  • ERP Applications Under Fire

    ERP Applications Under Fire

    The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what

    Read Report
  • Hacktivism: Inside the house Anonymous built: 2/24:36

    Hacktivism: Inside the house Anonymous built: 2/2

    The second in a two part series on hacktivism, looking at the tools, tactics and procedures used, as well as some real world examples. Visit http://info.digitalshadows.com/LiveDemoRequest-youtube.ht

    Watch Video
  • Digital Shadows Shadow Search™ Demo2:10

    Digital Shadows Shadow Search™ Demo

    Shadow Search provides fast access to raw & curated intelligence that frees up time for other security responsibilities. Request a demo: https://info.digitalshadows.com/shadow-search-demo.html Resour

    Watch Video
  • Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital Risk Protection: Avoid Blind Spots with a More Complete Risk Picture

    Digital risk protection consists of monitoring and remediating external risk exposure online. In this blog, I take a look at the current state of digital risk protection and where I see its future.

    Read Report
  • FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar0:00

    FBI Cyber Division and Digital Shadows: Emerging Ransomware Threats Webinar

    Hear from the FBI Cyber Division’s leading ransomware investigator about the latest threats and vectors and gain insight into how to protect your organization.

    Watch Video
  • Digital Shadows Dark Web and Deep Web Intelligence Datasheet

    Digital Shadows Dark Web and Deep Web Intelligence Datasheet

    Learn the importance of Dark and Deep Web Source Intelligence to Minimize your Digital Risk.

    Read Report
  • 3 Steps to Protect Your Organization From Digital Risks Across the Open Deep and Dark Web58:41

    3 Steps to Protect Your Organization From Digital Risks Across the Open Deep and Dark Web

    In this live webinar with Forrester Research's Nick Hayes and Digital Shadows' Rick Holland, you will learn why it is critical to monitor and manage digital risk across the widest range of data source

    Watch Video
  • Digital Shadows Overview

    Digital Shadows Overview

    Digital Shadows monitors and manages an organization’s digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web.

    Read Report
  • Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files

    Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.

    Read Report
  • loading
    Loading More...