Read our full blog post here: https://www.digitalshadows.com/blog-and-research/the-2017-fsb-indictment-and-mitre-attack/
Sextortion 2.0: A New Lure
Back in September we released a blog about the large volume of sextortion email campaigns that were hitting...
Other content in this Stream
Understand threat actors, their behavior, and the assets they target.
Digital Risk Protection and Threat Intelligence: An Overview
Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita
Too Much Information: The Sequel | New Research
There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.
Digital Shadows Photon Research Team
Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the
Purple Teaming with Vectr, Cobalt Strike, and MITRE ATT&CK™
Authors: Simon Hall, Isidoros Monogioudis Here at Digital Shadows we perform regular purple team exercises to continually challenge and ...
SamSam and Mitre ATT&CK
Understanding Threat Modelling
What is a threat model? Threat modelling, as defined by OWASP, “works to identify, communicate, and understand threats and mitigations ...
6 Considerations When Purchasing Threat Intelligence
When selecting the optimal Cyber Threat Intelligence solution for your organization, use this guide to assess threat intelligence providers across 6 critical categories.
Blog | F3EAD: Find, Fix, Finish, Exploit, Analyze and Disseminate – The Alternative Intelligence Cycle
The F3EAD cycle (Find, Fix Finish, Exploit, Analyze and Disseminate) is an alternative intelligence cycle commonly used within Western militaries.
Dark Web Typosquatting: Scammers v. Tor
Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can ...
Blog | The Intelligence Cycle – What Is It Good For?
A walk through the five steps of the intelligence cycle according to Digital Shadows.
SANS DFIR Cyber Threat Intelligence Summit 2019 – Extracting More Value from Your CTI Program
We were fortunate to attend the 2019 SANS DFIR Cyber Threat Intelligence Summit this year, which brings together some of ...
Cyber Risks and High-frequency Trading: Conversation with an Insider
Research from the Carnegie Endowment for International Peace published this week focused the attention on how financial systems around the ...
A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure
Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.
Bomb Threat Emails: Extortion Gets Physical
Digital Shadows has been able to analyse a series of these bomb threat emails. In this blog, we provide six things we know so far.
Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework
We took our recent work on the Mitre ATT&CK framework and various indictments of cyber criminals and nation state actors and mapped them to the Essential 8 framework.
Sextortion 2.0: A New Lure
Back in September we released a blog about the large volume of sextortion email campaigns that were hitting people’s inboxes. ...
The 2017 FSB indictment and Mitre ATT&CK™
On February 28th, 2017 the US Department of Justice indicted a notorious hacker, Alexsey Belan, and his FSB (Russia’s internal ...
MITRE ATT&CK™ and the North Korean Regime-Backed Programmer
On 6th September the US Department of Justice (DOJ) unsealed an indictment against a North Korean regime-backed programmer who is ...
Online Cybercrime Courses: Back to School Season