Technology
We help the world’s largest and fastest growing technology companies manage their digital risk.
-
Top Cyber Threats to the Technology Sector
The nature of the services offered by technology companies means they often collect sensitive customer data and supply critical communication infrastructure to their clients.
-
Resources for Your Team during the Coronavirus Pandemic
Take Me There -
Reducing technical leakage: Detecting software exposure from the outside-in
A combination of the rapid delivery of software, onset of digital transformation, and poor security practices, have increased the likelihood of sensitive technical data being exposed online.
-
Technical Leakage Detection Overview
SearchLight searches identifies exposed technical information by alerting organizations to unauthorized commits to public code repositories, exposed access keys, and other type of exposed technical...
-
Detecting Unauthorized Code Commits
See how a technology company discovered credentials for their CRM platform.
-
Third Party Risk: 4 ways to manage your security ecosystem
Don’t assume your data is safe because you’ve completed a vendor risk questionnaire, or the third-party has a promising risk score. Data finds a way online. Find a way to detect it when it does.
-
NSA Vulnerability Disclosure: Pros and Cons
On Monday, January 13th, Brian Krebs reported that Microsoft would be releasing “a software update on Tuesday to fix ...
-
A Practical Guide to Reducing Digital Risk
This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.
-
Too Much Information: The Sequel | New Research
There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.
-
Domain Squatting: The Phisher-man’s Friend
Simon talks about how easy it is to conduct domain squatting and typosquatting, and how little monitoring still goes on around them in the industry.
-
Detecting Fake Social Media Profiles | Case Study
See how a bank removed a spoof social media profiles targeting customers.
-
The Modern Cybercriminal Forum
We took a deep-dive into the cybercriminal underground to investigate the persistence of forums, uncovering several reasons they remain attractive amid appealing alternatives.
-
2020 Cybersecurity Forecasts: 5 trends and predictions for the new year
In this blog, we discuss several significant trends and events that have helped shape the cyber threat landscape, all of which will almost certainly continue through 2020.
-
Dark Web Marketplace Trends
Our team of researchers recently dug into the different popular dark web marketplaces to understand which marketplaces are gaining the most traction and what is being sold on these cybercriminal platf
-
Threat Intelligence: A Deep Dive
Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a ...
-
Forums are Forever – Part 1: Cybercrime Never Dies
The survival of the cybercriminal forum in the face of new, more secure technologies and constant pressure from law enforcement does not come as a surprise to researchers at Digital Shadows.
-
Forums are Forever – Part 2: Shaken, but not Stirred
Part 2 looks at cybercriminal forum users’ resistance to moving away from the forum model.
-
A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias
This blog seeks to rebalance intelligence tradecraft discussions by highlighting some of the less glamorous everyday sources of bias that are too often overlooked.
-
Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground
we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat
-
Asset Inventory Management: Difficult But Essential
Asset inventories are one of the most important things to get right. Done correctly, they give you the best insight into your potential attack surface and identify where to focus your efforts.
-
Understanding the Different Cybercriminal Platforms: AVCs, Marketplaces, and Forums
We’re all familiar with forums and marketplaces (we use them in our daily lives – think Reddit, eBay, or Amazon, for example), but what exactly is an AVC? What do they look like?
-
Loading More...