Digital Shadows helped an IT manager of a large technology company discover a significant amount of their source code - including their credentials for their administrator - on a public site.
ERP Applications Under Fire
The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state ac...
Error - something went wrong!
Other content in this Stream
Top Cyber Threats to the Technology Sector
The nature of the services offered by technology companies means they often collect sensitive customer data and supply critical communication infrastructure to their clients.
2019 Cyber Security Forecasts: Six Things on the Horizon
For this blog, we looked at trends and events that have shaped the digital risk landscape this year and how they might play out in 2019.
How to Leverage Threat Intelligence to Protect Against Digital Risks
Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab
Episode 54: Marriott Breach And 2019 Trends
Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott data breach, as well as a look forward to trends we might see in 2019. Specifically, we dig...
Digital Risk Protection 2018 Forrester New Wave
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
Mitigating the Top 7 Dark Web Threats to Your Enterprise
The dark web continues to pose extremely dangerous threats as cyber criminals coordinate attacks and trade intelligence about your enterprise. Join us for us for an informative session on the 7 most p
Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework
Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it calls the “Essential 8”: a set ...
Black Friday and Cybercrime: Retail’s Frankenstein Monster
With every year that passes, Black Friday seems to morph into a creation its original proponents could not have even ...
Sextortion 2.0: A New Lure
Back in September we released a blog about the large volume of sextortion email campaigns that were hitting people’s inboxes. ...
Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework
We took our recent work on the Mitre ATT&CK framework and various indictments of cyber criminals and nation state actors and mapped them to the Essential 8 framework.
Cybercriminals on the Outlook for Your Emails
In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.
ERP Applications Under Fire
The findings of this joint research between Digital Shadows and Onapsis shed light into how nation-state actors, cybercriminals and hacktivist groups are actively attacking these applications and what
Episode 47: Ransomware Surges in October, Cathay Pacific Breach, and Triton Attributed
Harrison Van Riper and Rafael Amado join Michael Marriott to discuss the latest stories from the week. This week’s podcast has a strong Guy Richie flavor, with a focus on lock, stock and ru...
Demystifying the Dark Web and Mitigating Risks
Hear this informative session on mitigating risks from the dark web and best practices in data loss prevention.
6 Considerations When Purchasing Threat Intelligence
When selecting the optimal CTI solution for your organization, buyers should use CARTER as a guide to assess threat intelligence providers across six critical categories.
Business Email Compromise: Best Practices Preventing Email Cyber Attacks From Stealing Millions
During this session you’ll learn from Dean Kinsman, Supervisory Special Agent with the FBI Cyber Division in Nashville and Rafael Amado of Digital Shadows on how to identify and prevent business email
How ADP Manages 3rd Party & Supply Chain Risk
Recorded webcast with Guest Speaker V.Jay LaRosa from ADP discussing best practices mitigating cyber risks from complex service delivery ecosystems.
Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files
Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.
MITRE ATT&CK and GRU Indictment
we have used the MITRE ATT&CK™ framework as our methodology to play back the findings of the indictment. In doing so, we aim to provide key lessons organizations can take away from this indictment.
Digital Shadows Shadow Search™ Demo