In the spotlight this week: Since the recent airstrikes by the United States in Iran, which resulted in the death of General Qasem Soleimani, security researchers and media outlets have been focused on the potential of any Iran-associated response. The geopolitical tension that already existed between the United States and Iran has sometimes resulted in offensive cyber activity―mostly destructive, disruptive, and/or espionage campaigns. A cyber response from Iran is an option but in this case there is no guarantee, considering the nature and impact of the physical event. If any does occur, the Iranian threat actors’ capabilities, tool sophistication, and tactics, techniques, and procedures (TTPs), as well as impact of a successful cyber attack, would likely be similar to those previously exhibited, although the motive and attack focus may differ.

Request a
Live Demo
Other content in this Stream
Given the frequent number of transactions, retail companies are frequently the target of financially-motivated threat actors seeking to compromise payment card details.

This year, we will discuss the most common alerts we have sent to our retail clients, how these digital risks affect consumers as the holiday season approaches, and peek into the cybercriminal...

See how one global retailer detected almost 2,000 domains impersonating their brand.

Fans of The Sopranos or Goodfellas are well-versed in the world of extortion. Whether it is paying off Tony Soprano ...

Learn how to combat Online counterfeiting, Trademark infringement, Fake social media sites, Fraudulent websites, and Fake mobile apps. Check out this recorded webinar for more.

Coming to you from Dallas this week - we have Kacey, Harrison, Alex, and Charles. This week the team talks through third party app risks as they relate to COVID-19, as well as touch on security...
Digital Shadows client received an email from a known attack group demanding a large sum of money to prevent a denial-of-service attack on their website.

Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

Watch this on demand webinar to learn how to identify and eliminate counterfeit digital sites, social media, and apps and how to identify and mitigate threats from the dark web.

Kacey, Charles, Alex, and Harrison host this week’s threat intelligence update from Dallas. We kick off with vulnerabilities from the week. This includes both the NSA CVE and Citrix CVE. The team...

The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can ...

Our team of researchers recently dug into the different popular dark web marketplaces to understand which marketplaces are gaining the most traction and what is being sold on these cybercriminal platf

See how a bank removed a spoof social media profiles targeting customers.

In this blog, we discuss several significant trends and events that have helped shape the cyber threat landscape, all of which will almost certainly continue through 2020.

Viktoria hosts this week and introduces the episode bringing Sammy on to provide some regional insight and context around the Iranian cyber threat and discusses whether a cyber response is likely.

Criminals are conducting Black Friday sales amongst themselves, many of which are on the dark web.

While it may be challenging to assess what went wrong for market[.]ms conclusively, this blog examines some potential reasons behind its demise, as well as looking at the extraordinary professionalism
We took a deep-dive into the cybercriminal underground to investigate the persistence of forums, uncovering several reasons they remain attractive amid appealing alternatives.

Part 2 looks at cybercriminal forum users’ resistance to moving away from the forum model.