Threat Intelligence
Understand threat actors, their behavior, and the assets they target.
-
Meet DUMPS Forum: A pro-Ukraine, anti-Russia cybercriminal forum
A new, pro-Ukrainian and anti-Russian and anti-Belarus forum has since been identified, allowing users to get involved in the fight. Check out the details for “DUMPS Forum” in our latest blog.
-
Tensions between the PRC and Taiwan: What’s happening?
In this blog, stay updated on every cyber attack happening in the context of the current PRC-Taiwan tensions.
-
Account takeover: Are you opening the door for cyber threat actors?
In 2020, our research report on account takeover (ATO) highlighted the risk of using credentials in an unsafe manner, which ...
-
Advanced persistent threat group feature: Mustang Panda
Advanced persistent threat (APT) groups are often tricky to wrap your head around. By their nature, state-associated groups are well-resourced ...
-
Colonial Pipeline One Year Later: What’s Changed?
For the first half of 2021, ransomware groups looked unstoppable. Ransomware gangs were adding victim after victim on their dark ...
-
The Russia – Ukraine war: Two months in
The two-month mark of the Russia and Ukraine war has passed, with Russia almost certainly having failed to meet its ...
-
The role of Non-Fungible Tokens (NFTs) in facilitating cybercrime
You’d have to have been living under a rock to have avoided the excitement surrounding Non-Fungible-Tokens (NFTs) in the last ...
-
Five things we learned from the Conti chat logs
At the end of February, the cybersecurity community was rocked by the appearance of alleged chat logs recording conversations between ...
-
The Power of Data Analysis in Threat Intelligence – Part 1: Data Collection and Data Mining
In 2020, there was an estimated 59 trillion gigabytes of data in the world. Most of which was created in ...
-
Cyber Threat Intelligence Solutions Guide
This guide outlines best practices for cyber threat intelligence and features resources to leverage when developing or improving your organization's cyber threat intelligence capabilities.
-
Threat Intelligence Datasheet
Cyber Threat Intelligence is brought to you by Digital Shadows’ Photon Research Team.
-
Weekly Intelligence Summary 22nd Oct
-
29:10
Operationalizing Cyber Threat Intelligence with SearchLight
Join Digital Shadows to learn about exciting new functionality, which helps organizations of all sizes to get value out of Cyber Threat Intelligence.
-
New Release: Actionable Threat Intelligence with SearchLight
This year interest in cyber threat intelligence has risen to an all-time high. High profile events such as the Solarwinds ...
-
Digital Shadows Named #1 in Digital Risk Protection
Read Report -
5 Ways to Take Action on Threat Intelligence
The Gartner definition of threat intelligence is “…evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing ...
-
1:06
Silence the Noise | Digital Shadows
Threat intelligence is noisy. Tune out the noise with Digital Shadows. Visit www.digitalshadows.com to schedule a demo today!
-
Digital Shadows and the Intelligence Cycle
This illustration of the intelligence cycle will allow you to see what we do at each stage of the cycle to ensure we effectively answer stakeholder requirements.
-
Tactical Threat Intelligence and You: What Does It All Mean?
What is tactical threat intelligence? If threat intelligence is the umbrella, within that umbrella lies strategic and tactical intelligence, next ...
-
Threat Intelligence Can Be Noisy: SearchLight Helps
Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence ...
-
Cyber Threat Intelligence Resources
A compilation of some of our favorite readings, resources, and tools that relate to Cyber Threat Intelligence.
-
Loading More...