Threat Intelligence

Understand threat actors, their behavior, and the assets they target.

  • Meet DUMPS Forum: A pro-Ukraine, anti-Russia cybercriminal forum

    Meet DUMPS Forum: A pro-Ukraine, anti-Russia cybercriminal forum

    A new, pro-Ukrainian and anti-Russian and anti-Belarus forum has since been identified, allowing users to get involved in the fight. Check out the details for “DUMPS Forum” in our latest blog.

    Read Post
  • Tensions between the PRC and Taiwan: What’s happening?

    Tensions between the PRC and Taiwan: What’s happening?

    In this blog, stay updated on every cyber attack happening in the context of the current PRC-Taiwan tensions.

    Read Post
  • Account takeover: Are you opening the door for cyber threat actors?

    Account takeover: Are you opening the door for cyber threat actors?

    In 2020, our research report on account takeover (ATO) highlighted the risk of using credentials in an unsafe manner, which ...

    Read Post
  • Advanced persistent threat group feature: Mustang Panda

    Advanced persistent threat group feature: Mustang Panda

    Advanced persistent threat (APT) groups are often tricky to wrap your head around. By their nature, state-associated groups are well-resourced ...

    Read Post
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Colonial Pipeline One Year Later: What’s Changed?

    Colonial Pipeline One Year Later: What’s Changed?

    For the first half of 2021, ransomware groups looked unstoppable. Ransomware gangs were adding victim after victim on their dark ...

    Read Post
  • The Russia – Ukraine war: Two months in

    The Russia – Ukraine war: Two months in

    The two-month mark of the Russia and Ukraine war has passed, with Russia almost certainly having failed to meet its ...

    Read Post
  • The role of Non-Fungible Tokens (NFTs) in facilitating cybercrime

    The role of Non-Fungible Tokens (NFTs) in facilitating cybercrime

    You’d have to have been living under a rock to have avoided the excitement surrounding Non-Fungible-Tokens (NFTs) in the last ...

    Read Post
  • Five things we learned from the Conti chat logs

    Five things we learned from the Conti chat logs

    At the end of February, the cybersecurity community was rocked by the appearance of alleged chat logs recording conversations between ...

    Read Post
  • The Power of Data Analysis in Threat Intelligence – Part 1: Data Collection and Data Mining

    The Power of Data Analysis in Threat Intelligence – Part 1: Data Collection and Data Mining

    In 2020, there was an estimated 59 trillion gigabytes of data in the world. Most of which was created in ...

    Read Post
  • Cyber Threat Intelligence Solutions Guide

    Cyber Threat Intelligence Solutions Guide

    This guide outlines best practices for cyber threat intelligence and features resources to leverage when developing or improving your organization's cyber threat intelligence capabilities.

    Read Report
  • Threat Intelligence Datasheet

    Threat Intelligence Datasheet

    Cyber Threat Intelligence is brought to you by Digital Shadows’ Photon Research Team.

    Read Report
  • Weekly Intelligence Summary 22nd Oct

    Weekly Intelligence Summary 22nd Oct

    Read Report
  • Operationalizing Cyber Threat Intelligence with SearchLight29:10

    Operationalizing Cyber Threat Intelligence with SearchLight

    Join Digital Shadows to learn about exciting new functionality, which helps organizations of all sizes to get value out of Cyber Threat Intelligence.

    Watch Video
  • New Release: Actionable Threat Intelligence with SearchLight

    New Release: Actionable Threat Intelligence with SearchLight

    This year interest in cyber threat intelligence has risen to an all-time high. High profile events such as the Solarwinds ...

    Read Post
  • Digital Shadows Named #1 in Digital Risk Protection

    Read Report
  • 5 Ways to Take Action on Threat Intelligence

    5 Ways to Take Action on Threat Intelligence

    The Gartner definition of threat intelligence is “…evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing ...

    Read Post
  • Silence the Noise | Digital Shadows1:06

    Silence the Noise | Digital Shadows

    Threat intelligence is noisy. Tune out the noise with Digital Shadows. Visit www.digitalshadows.com to schedule a demo today!

    Watch Video
  • Digital Shadows and the Intelligence Cycle

    Digital Shadows and the Intelligence Cycle

    This illustration of the intelligence cycle will allow you to see what we do at each stage of the cycle to ensure we effectively answer stakeholder requirements.

    Read Report
  • Tactical Threat Intelligence and You: What Does It All Mean?

    Tactical Threat Intelligence and You: What Does It All Mean?

    What is tactical threat intelligence? If threat intelligence is the umbrella, within that umbrella lies strategic and tactical intelligence, next ...

    Read Post
  • Threat Intelligence Can Be Noisy: SearchLight Helps

    Threat Intelligence Can Be Noisy: SearchLight Helps

    Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence ...

    Read Post
  • Cyber Threat Intelligence Resources

    Cyber Threat Intelligence Resources

    A compilation of some of our favorite readings, resources, and tools that relate to Cyber Threat Intelligence.

    Read Report
  • loading
    Loading More...