Threat Intelligence

Understand threat actors, their behavior, and the assets they target.

  • Threat Intelligence

    Threat Intelligence

    Understand threat actors, their behavior, and the assets they target.

    Read Report
  • ×

    Live Webinar w/ FBI Cyber Division
    Aug 28:

    Your Data at Risk

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 August - Your Data at Risk Webinar
    Thank you!
    Error - something went wrong!
  • Digital Risk Protection and Threat Intelligence: An Overview2:13

    Digital Risk Protection and Threat Intelligence: An Overview

    Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita

    Watch Video
  • Too Much Information: The Sequel | New Research

    Too Much Information: The Sequel | New Research

    There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.

    Read Report
  • Digital Shadows Photon Research Team2:55

    Digital Shadows Photon Research Team

    Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the

    Watch Video
  • Purple Teaming with Vectr, Cobalt Strike, and MITRE ATT&CK™

    Purple Teaming with Vectr, Cobalt Strike, and MITRE ATT&CK™

    Authors: Simon Hall, Isidoros Monogioudis   Here at Digital Shadows we perform regular purple team exercises to continually challenge and ...

    Read Post
  • SamSam and Mitre ATT&CK

    SamSam and Mitre ATT&CK

    Read Report
  • Understanding Threat Modelling

    Understanding Threat Modelling

    What is a threat model? Threat modelling, as defined by OWASP, “works to identify, communicate, and understand threats and mitigations ...

    Read Post
  • 6 Considerations When Purchasing Threat Intelligence

    6 Considerations When Purchasing Threat Intelligence

    When selecting the optimal Cyber Threat Intelligence solution for your organization, use this guide to assess threat intelligence providers across 6 critical categories.

    Read Report
  • Blog | F3EAD: Find, Fix, Finish, Exploit, Analyze and Disseminate – The Alternative Intelligence Cycle

    Blog | F3EAD: Find, Fix, Finish, Exploit, Analyze and Disseminate – The Alternative Intelligence Cycle

    The F3EAD cycle (Find, Fix Finish, Exploit, Analyze and Disseminate) is an alternative intelligence cycle commonly used within Western militaries.

    Read Post
  • Dark Web Typosquatting: Scammers v. Tor

    Dark Web Typosquatting: Scammers v. Tor

    Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can ...

    Read Post
  • Blog | The Intelligence Cycle – What Is It Good For?

    Blog | The Intelligence Cycle – What Is It Good For?

    A walk through the five steps of the intelligence cycle according to Digital Shadows.

    Read Post
  • SANS DFIR Cyber Threat Intelligence Summit 2019 – Extracting More Value from Your CTI Program

    SANS DFIR Cyber Threat Intelligence Summit 2019 – Extracting More Value from Your CTI Program

    We were fortunate to attend the 2019 SANS DFIR Cyber Threat Intelligence Summit this year, which brings together some of ...

    Read Post
  • Cyber Risks and High-frequency Trading: Conversation with an Insider

    Cyber Risks and High-frequency Trading: Conversation with an Insider

    Research from the Carnegie Endowment for International Peace published this week focused the attention on how financial systems around the ...

    Read Post
  • A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.

    Read Report
  • Bomb Threat Emails: Extortion Gets Physical

    Bomb Threat Emails: Extortion Gets Physical

    Digital Shadows has been able to analyse a series of these bomb threat emails. In this blog, we provide six things we know so far.

    Read Post
  • Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework

    Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework

    We took our recent work on the Mitre ATT&CK framework and various indictments of cyber criminals and nation state actors and mapped them to the Essential 8 framework.

    Read Report
  • Sextortion 2.0: A New Lure

    Sextortion 2.0: A New Lure

    Back in September we released a blog about the large volume of sextortion email campaigns that were hitting people’s inboxes. ...

    Read Post
  • MITRE ATT&CK and the 2017 FSB Indictment

    MITRE ATT&CK and the 2017 FSB Indictment

    As with our previous work on the GRU, FIN7, and North Korean indictments, we’ve used the Mitre ATT&CK™ framework to play back the findings from the indictment.

    Read Report
  • The 2017 FSB indictment and Mitre ATT&CK™

    The 2017 FSB indictment and Mitre ATT&CK™

    On  February 28th, 2017 the US Department of Justice indicted a notorious hacker, Alexsey Belan, and his FSB (Russia’s internal ...

    Read Post
  • MITRE ATT&CK™ and the North Korean Regime-Backed Programmer

    MITRE ATT&CK™ and the North Korean Regime-Backed Programmer

    On 6th September the US Department of Justice (DOJ) unsealed an indictment against a North Korean regime-backed programmer who is ...

    Read Post
  • loading
    Loading More...