Threat Intelligence

Understand threat actors, their behavior, and the assets they target.

  • From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

    From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

    Over the past 2.5 years, we have been analyzing how cybercriminals conspire to prey upon users of online services by “taking over” the accounts they all use...

    Read Report
  • Resources for Your Team during the Coronavirus Pandemic

    Take Me There
  • ×

    Ransomware Round Up

    - August 25 -
    Live Webinar

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2020August - Ransomware Webinar
    Thank you!
    Error - something went wrong!
  • Weekly: CWT pays ransom, data leaked for 900+ Pulse Secure Servers, EU issues first cyber sanctions

    Weekly: CWT pays ransom, data leaked for 900+ Pulse Secure Servers, EU issues first cyber sanctions

    In this week’s episode, Viktoria is joined by Kim, Dylan and Demelza to discuss the latest threat intelligence.

    Read Post
  • Special: Guest Geoff White Talks Best-Selling Book Crime Dot Com

    Special: Guest Geoff White Talks Best-Selling Book Crime Dot Com

    ShadowTalk hosts Viktoria and James talk to special guest Geoff about his best selling book Crime Dot Com.

    Read Post
  • Understand threat actors, their behavior, and the assets they target.

    Learn More
  • Weekly: Garmin ransomware attack, QSnatch malware, and ShinyHunters Stage 2

    Weekly: Garmin ransomware attack, QSnatch malware, and ShinyHunters Stage 2

    This week it’s a full house with ShadowTalk hosts Alex, Kacey, Charles, Alec and Rick.

    Read Post
  • Heard our ShadowTalk Threat Intelligence Podcast?

    Subscribe Here!
  • Weekly Intelligence Summary 07 August 2020

    Weekly Intelligence Summary 07 August 2020

    “Lazarus Group” has reportedly used their newly identified “MATA” malware framework and newly created “VHD” ransomware to target high-profile victims.

    Read Report
  • Webinar: Account Takeover: Data Findings, Popular Tools, and Prevalent Actors0:00

    Webinar: Account Takeover: Data Findings, Popular Tools, and Prevalent Actors

    Join the Photon team to learn about our latest research on account takeover.

    Watch Video
  • Weekly: Trickbot trojan mishaps, Emotet resurgence, Twitter takeovers, and APT group updates

    Weekly: Trickbot trojan mishaps, Emotet resurgence, Twitter takeovers, and APT group updates

    This week’s ShadowTalk hosts Adam, Demi, Stefano and Kim discuss the latest threat intelligence stories.

    Read Post
  • Weekly: Twitter takeovers, Data Viper breached by NightLion, and a look at CryptBB

    Weekly: Twitter takeovers, Data Viper breached by NightLion, and a look at CryptBB

    This week’s ShadowTalk hosts Alex, Kacey, and Alec discuss the latest threat intelligence stories.

    Read Post
  • SPECIAL: Guest Speaker Tom Schmitt Talks About His Origins in Cyber Threat Intel and TITO

    SPECIAL: Guest Speaker Tom Schmitt Talks About His Origins in Cyber Threat Intel and TITO

    CISO Rick Holland and Host Alex Guirakhoo chat with this week's special guest Tom Schmitt, Global Director of Threat Intelligence at Anheuser-Busch InBev.

    Read Post
  • Threat Intelligence Overview

    Threat Intelligence Overview

    SearchLight offers a range of different types of intelligence products, including actor profiles, findings from our closed- source team, weekly intelligence summaries, quick tippers, and deep-dive ...

    Read Report
  • Threat Model of a Remote Worker [Recorded Webinar]56:31

    Threat Model of a Remote Worker [Recorded Webinar]

    Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has

    Watch Video
  • Weekly: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights From DS CISO Rick

    Weekly: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights From DS CISO Rick

    Alex, Kacey, Charles and Rick host this week’s ShadowTalk to bring you the latest threat intelligence stories.

    Read Post
  • Security Threat Intel Products and Services: Mapping SearchLight

    Security Threat Intel Products and Services: Mapping SearchLight

    Very few organizations have access to vast resources that will enable them to build out a ...

    Read Post
  • CISA and FBI alert: Top vulnerabilities exploited from 2016-2019 and trends from 2020

    CISA and FBI alert: Top vulnerabilities exploited from 2016-2019 and trends from 2020

    A couple of weeks ago, the United States Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation ...

    Read Post
  • New DDoS protection tool advertised on the dark web

    New DDoS protection tool advertised on the dark web

    This blog examines a newly launched DDoS protection filter mechanism dubbed EndGame advertised last week on the dark web community ...

    Read Post
  • Dark Web Digest: Gaining Valuable Threat Intel from Cybercriminal Forums29:51

    Dark Web Digest: Gaining Valuable Threat Intel from Cybercriminal Forums

    In this webinar, Alex and Kacey cover dark web trends that we have recently observed, the risk impact associated with cybercriminal behaviors, and mitigation strategies for your organization.

    Watch Video
  • WEEKLY: Hacktivist Group Chooses Destruction Over Profit w/ Ransomware and Collection 1 Hacker Identified

    WEEKLY: Hacktivist Group Chooses Destruction Over Profit w/ Ransomware and Collection 1 Hacker Identified

    Pietro, Viktoria, Adam, and Demelza cover this week’s top threat intelligence stories, including a Hacktivist group choosing destruction over profit with ransomware.

    Read Post
  • Threat Intelligence: A Deep Dive

    Threat Intelligence: A Deep Dive

      Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a ...

    Read Post
  • The 2020 Verizon Data Breach Investigations Report: One CISO’s View

    The 2020 Verizon Data Breach Investigations Report: One CISO’s View

    Sadly, Marvel’s Black Widow release date was pushed back as a result of COVID19, but thankfully the 2020 Verizon Data ...

    Read Post
  • Threat Intelligence Feeds: Why Context is Key

    Threat Intelligence Feeds: Why Context is Key

    Key Takeaways: Choosing which threat intelligence feeds to rely on can be a daunting task: Different feeds provide varying levels ...

    Read Post
  • loading
    Loading More...