Technology

We help the world’s largest and fastest growing technology companies manage their digital risk.

  • Top Cyber Threats to the Technology Sector

    Top Cyber Threats to the Technology Sector

    The nature of the services offered by technology companies means they often collect sensitive customer data and supply critical communication infrastructure to their clients.

    Read Report
  • Resources for Your Team during the Coronavirus Pandemic

    Take Me There
  • Reducing technical leakage: Detecting software exposure from the outside-in

    Reducing technical leakage: Detecting software exposure from the outside-in

    Modern Development Practices Leads to Increased Exposure As customers, we can be a bit demanding when it comes to technology ...

    Read Post
  • Technical Leakage Detection Overview

    Technical Leakage Detection Overview

    SearchLight searches identifies exposed technical information by alerting organizations to unauthorized commits to public code repositories, exposed access keys, and other type of exposed technical...

    Read Report
  • Detecting Unauthorized Code Commits

    Detecting Unauthorized Code Commits

    See how a technology company discovered credentials for their CRM platform.

    Read Report
  • Forrester New Wave Report: Digital Risk Protection

    Forrester New Wave Report: Digital Risk Protection

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Discover why we’re named a "Leader" in Digital Risk Protection

    Forrester Report
  • Third Party Risk: 4 ways to manage your security ecosystem

    Third Party Risk: 4 ways to manage your security ecosystem

      The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can ...

    Read Post
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • NSA Vulnerability Disclosure: Pros and Cons

    NSA Vulnerability Disclosure: Pros and Cons

      On Monday, January 13th, Brian Krebs reported that Microsoft would be releasing “a software update on Tuesday to fix ...

    Read Post
  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • Too Much Information: The Sequel | New Research

    Too Much Information: The Sequel | New Research

    There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.

    Read Report
  • ×

    Account Takeover: Data Findings, Popular Tools, and Prevalent Actors

    - July 15 -
    Live Webinar

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2020 June - ATO Webinar
    Thank you!
    Error - something went wrong!
  • Domain Squatting: The Phisher-man’s Friend

    Domain Squatting: The Phisher-man’s Friend

    Simon talks about how easy it is to conduct domain squatting and typosquatting, and how little monitoring still goes on around them in the industry.

    Read Post
  • Detecting Fake Social Media Profiles | Case Study

    Detecting Fake Social Media Profiles | Case Study

    See how a bank removed a spoof social media profiles targeting customers.

    Read Report
  • ×

    Request a
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • The Modern Cybercriminal Forum

    The Modern Cybercriminal Forum

    We took a deep-dive into the cybercriminal underground to investigate the persistence of forums, uncovering several reasons they remain attractive amid appealing alternatives.

    Read Report
  • 2020 Cybersecurity Forecasts: 5 trends and predictions for the new year

    2020 Cybersecurity Forecasts: 5 trends and predictions for the new year

    In this blog, we discuss several significant trends and events that have helped shape the cyber threat landscape, all of which will almost certainly continue through 2020.

    Read Post
  • Dark Web Marketplace Trends 2019

    Dark Web Marketplace Trends 2019

    Our team of researchers recently dug into the different popular dark web marketplaces to understand which marketplaces are gaining the most traction and what is being sold on these cybercriminal platf

    Read Report
  • How One Global Retailer Detected Almost 2,000 Spoof Domains | Case Study

    How One Global Retailer Detected Almost 2,000 Spoof Domains | Case Study

    See how one global retailer detected almost 2,000 domains impersonating their brand.

    Read Report
  • Threat Intelligence: A Deep Dive

    Threat Intelligence: A Deep Dive

      Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a ...

    Read Post
  • Forums are Forever – Part 1: Cybercrime Never Dies

    Forums are Forever – Part 1: Cybercrime Never Dies

    The survival of the cybercriminal forum in the face of new, more secure technologies and constant pressure from law enforcement does not come as a surprise to researchers at Digital Shadows.

    Read Post
  • Forums are Forever – Part 2: Shaken, but not Stirred

    Forums are Forever – Part 2: Shaken, but not Stirred

    Part 2 looks at cybercriminal forum users’ resistance to moving away from the forum model.

    Read Post
  • A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias

    A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias

    This blog seeks to rebalance intelligence tradecraft discussions by highlighting some of the less glamorous everyday sources of bias that are too often overlooked.

    Read Post
  • Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat

    Read Post
  • loading
    Loading More...