Threat Intelligence

Understand threat actors, their behavior, and the assets they target.

  • From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

    From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

    Over the past 18 months we have been analyzing how cybercriminals conspire to prey upon users of online services by “taking over” the accounts they all use...

    Read Report
  • ×

    Account Takeover: Data Findings, Popular Tools, and Prevalent Actors

    - July 15 -
    Live Webinar

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2020 June - ATO Webinar
    Thank you!
    Error - something went wrong!
  • Resources for Your Team during the Coronavirus Pandemic

    Take Me There
  • SPECIAL: Guest Speaker Tom Schmitt Talks About His Origins in Cyber Threat Intel and TITO

    SPECIAL: Guest Speaker Tom Schmitt Talks About His Origins in Cyber Threat Intel and TITO

    CISO Rick Holland and Host Alex Guirakhoo chat with this week's special guest Tom Schmitt, Global Director of Threat Intelligence at Anheuser-Busch InBev.

    Read Post
  • Threat Intelligence Overview

    Threat Intelligence Overview

    SearchLight offers a range of different types of intelligence products, including actor profiles, findings from our closed- source team, weekly intelligence summaries, quick tippers, and deep-dive ...

    Read Report
  • Understand threat actors, their behavior, and the assets they target.

    Learn More
  • Weekly Intelligence Summary 03 July 2020

    Weekly Intelligence Summary 03 July 2020

    A two-pronged approach in a new cyber-threat campaign revealed cooperation between the “InvisiMole” threat collective and pro-Russia group “Gamaredon”

    Read Report
  • Heard our ShadowTalk Threat Intelligence Podcast?

    Subscribe Here!
  • Threat Model of a Remote Worker [Recorded Webinar]56:31

    Threat Model of a Remote Worker [Recorded Webinar]

    Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has

    Watch Video
  • Weekly: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights From DS CISO Rick

    Weekly: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights From DS CISO Rick

    Alex, Kacey, Charles and Rick host this week’s ShadowTalk to bring you the latest threat intelligence stories.

    Read Post
  • Security Threat Intel Products and Services: Mapping SearchLight

    Security Threat Intel Products and Services: Mapping SearchLight

    Very few organizations have access to vast resources that will enable them to build out a ...

    Read Post
  • CISA and FBI alert: Top vulnerabilities exploited from 2016-2019 and trends from 2020

    CISA and FBI alert: Top vulnerabilities exploited from 2016-2019 and trends from 2020

    A couple of weeks ago, the United States Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation ...

    Read Post
  • New DDoS protection tool advertised on the dark web

    New DDoS protection tool advertised on the dark web

    This blog examines a newly launched DDoS protection filter mechanism dubbed EndGame advertised last week on the dark web community ...

    Read Post
  • Dark Web Digest: Gaining Valuable Threat Intel from Cybercriminal Forums29:51

    Dark Web Digest: Gaining Valuable Threat Intel from Cybercriminal Forums

    In this webinar, Alex and Kacey cover dark web trends that we have recently observed, the risk impact associated with cybercriminal behaviors, and mitigation strategies for your organization.

    Watch Video
  • WEEKLY: Hacktivist Group Chooses Destruction Over Profit w/ Ransomware and Collection 1 Hacker Identified

    WEEKLY: Hacktivist Group Chooses Destruction Over Profit w/ Ransomware and Collection 1 Hacker Identified

    Pietro, Viktoria, Adam, and Demelza cover this week’s top threat intelligence stories, including a Hacktivist group choosing destruction over profit with ransomware.

    Read Post
  • Threat Intelligence: A Deep Dive

    Threat Intelligence: A Deep Dive

      Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a ...

    Read Post
  • The 2020 Verizon Data Breach Investigations Report: One CISO’s View

    The 2020 Verizon Data Breach Investigations Report: One CISO’s View

    Sadly, Marvel’s Black Widow release date was pushed back as a result of COVID19, but thankfully the 2020 Verizon Data ...

    Read Post
  • Threat Intelligence Feeds: Why Context is Key

    Threat Intelligence Feeds: Why Context is Key

    Key Takeaways: Choosing which threat intelligence feeds to rely on can be a daunting task: Different feeds provide varying levels ...

    Read Post
  • How to Operationalize Threat Intelligence: Actionability and Context

    How to Operationalize Threat Intelligence: Actionability and Context

    Is there real value in threat intelligence? How can we leverage threat intelligence and make use of it in any meaningful way?

    Read Post
  • 3 Phishing Trends Organizations Should Watch Out For

    3 Phishing Trends Organizations Should Watch Out For

    Based on data from 2019 and what we’ve observed in 2020, Digital Shadows has gathered three phishing trends that cybercriminals and advanced persistent threat (APT) groups are using to target your ...

    Read Post
  • SPECIAL EPISODE: Contact Tracing and COVID-19

    SPECIAL EPISODE: Contact Tracing and COVID-19

    Physician-Scientist, Dr. Pratik Sinha, joins Alastair Paterson, and Rick Holland for this special guest episode. The group walks through Al and Pratik’s recent research into contact tracing.

    Read Post
  • A New Decade of Cyber Threats: Looking Back at the Trending Cyber Topics of Q1 2020

    A New Decade of Cyber Threats: Looking Back at the Trending Cyber Topics of Q1 2020

    Q1 2020 was packed full of significant global events, including military and geopolitical tensions and the onset of the COVID-19 ...

    Read Post
  • SPECIAL EPISODE: Remote Worker Security: Tech & ISP Providers, Data Security, And The Future

    SPECIAL EPISODE: Remote Worker Security: Tech & ISP Providers, Data Security, And The Future

    We're pleased to have a special guest, Steve Marshall, CISO and Head of Cyber Consulting at Bytes- a Software Licensing Reseller & IT Security Services. in this special episode, Steve Marshall,...

    Read Post
  • BitBazaar Market: Deception and Manipulation on the Dark Web

    BitBazaar Market: Deception and Manipulation on the Dark Web

    It’s a BitBazaar that they thought they could deceive us!: A Soap opera featuring dark web forums and marketplaces “When ...

    Read Post
  • loading
    Loading More...