Threat Intelligence

Understand threat actors, their behavior, and the assets they target.

  • Threat Intelligence

    Threat Intelligence

    Understand threat actors, their behavior, and the assets they target.

    Read Report
  • ×

    Interactive Threat Hunting on the Dark Web Webinar

    - Nov 6th -

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 November - Interactive Dark Web
    Thank you!
    Error - something went wrong!
  • Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat

    Read Post
  • Weekly Intelligence Summary 03 Oct - 10 Oct 2019

    Weekly Intelligence Summary 03 Oct - 10 Oct 2019

    In the spotlight this week is the Iran-linked threat group “APT35”, which took aim at the email accounts of political entities in the United States and prominent Iranians living outside Iran.

    Read Report
  • Typosquatting and the 2020 U.S. Presidential election10:00

    Typosquatting and the 2020 U.S. Presidential election

    Photon Research Team thought it would be interesting to use this pool of candidates as a backdrop for research into typosquatted domains

    Watch Video
  • Heard our ShadowTalk Threat Intelligence Podcast?

    Subscribe Here!
  • Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence

    Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence

    We’re back in London this week! Viktoria chats with Adam Cook, Philip Doherty, and Josh Poole on this week’s top stories. - APT35 Targets Email of US political figures & prominent Iranians -...

    Read Post
  • Top Threat Intelligence Podcasts to Add to Your Playlist

    Top Threat Intelligence Podcasts to Add to Your Playlist

    Looking for some new threat intelligence podcasts to add to your playlist? Look no further! Our Photon Threat Intelligence Research team shares their top tracks.

    Read Post
  • Threat Intelligence Time Management and Prioritization: An Interview with Xena Olsen

    Threat Intelligence Time Management and Prioritization: An Interview with Xena Olsen

    Rick Holland and Harrison Van Riper interview Xena Olsen in this episode of ShadowTalk. The team focus their discussion on how to get timely, but effective intelligence out the door.

    Read Post
  • ANU Breach Report: Mapping to Mitre ATT&CK Framework

    ANU Breach Report: Mapping to Mitre ATT&CK Framework

    We decided to map this intrusion to the Mitre ATT&CK framework, as we have done previously for:

    Read Post
  • The Tyurin Indictment- Mapping To The Mitre ATT&CK™ Framework

    The Tyurin Indictment- Mapping To The Mitre ATT&CK™ Framework

    Director of Security Engineering, Richard Gold, joins Viktoria Austin in this special episode of ShadowTalk to look at the attacker goals, their TTPs, and map this to the Mitre PRE-ATT&CK and...

    Read Post
  • Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

    Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

    How can the modern network of .onion marketplaces be understood through novels about a cyberpunk dystopia? The answer is in how dark web marketplaces grow and die.

    Read Post
  • Magecart Five Widens Attack Vectors, Targeting of Airbus Suppliers, & Tortoiseshell Developments

    Magecart Five Widens Attack Vectors, Targeting of Airbus Suppliers, & Tortoiseshell Developments

    Coming to you from London this week, Jamie Collier, Philip Doherty, and Josh Poole join Viktoria Austin for our weekly threat intelligence updates. The team kicks off with a discussion around the...

    Read Post
  • Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework

    Mapping the Tyurin Indictment to the Mitre ATT&CK™ framework

    When the attacker, Andrei Tyurin, pleaded guilty, we thought we could look at the attacker goals, their TTPs and map this to the Mitre PRE-ATT&CK and ATT&CK framework.

    Read Post
  • Domain Squatting: The Phisher-man’s Friend

    Domain Squatting: The Phisher-man’s Friend

    Simon talks about how easy it is to conduct domain squatting and typosquatting, and how little monitoring still goes on around them in the industry.

    Read Post
  • NCSC Cyber Threat Trends Report: Analysis of Attacks Across UK Industries

    NCSC Cyber Threat Trends Report: Analysis of Attacks Across UK Industries

    The United Kingdom’s National Cyber Security Centre (NCSC) recently released their Incident trends report (October 2018 – April 2019) which ...

    Read Post
  • Digital Risk Protection and Threat Intelligence: An Overview2:13

    Digital Risk Protection and Threat Intelligence: An Overview

    Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita

    Watch Video
  • Tortoiseshell Targets IT Providers, The Tyurin Indictment, And Emotet’s Return

    Tortoiseshell Targets IT Providers, The Tyurin Indictment, And Emotet’s Return

    The team digs into the first story of the week: Tortoiseshell Group (a newly identified threat group) has reportedly conducted some supply chain attack campaigns against 11 IT providers in Saudi Arabi

    Read Post
  • Dark Web Monitoring: The Good, The Bad, and The Ugly

    Dark Web Monitoring: The Good, The Bad, and The Ugly

    Gaining access to dark web and deep web sources can be extremely powerful – if you focus on relevant use cases. The most successful strategies we observe have clear requirements, such as fraud detecti

    Read Post
  • Your Data at Risk: FBI Cyber Division Shares Top Emerging Cyber Threats to Your Enterprise

    Your Data at Risk: FBI Cyber Division Shares Top Emerging Cyber Threats to Your Enterprise

    Data breaches are not slowing down. Nobody expects to be a victim, but the data shows the exponential growth in ...

    Read Post
  • Singapore Cyber Threat Landscape report (H1 2019)

    Singapore Cyber Threat Landscape report (H1 2019)

    Despite being the second smallest country in Asia, Singapore is a global financial and economic hub. On top of this, ...

    Read Post
  • 6 Considerations When Purchasing Threat Intelligence

    6 Considerations When Purchasing Threat Intelligence

    When selecting the optimal Cyber Threat Intelligence solution for your organization, use this guide to assess threat intelligence providers across 6 critical categories.

    Read Report
  • loading
    Loading More...