Threat Intelligence

July 18, 2019

Understand threat actors, their behavior, and the assets they target.

Organizations across the world have been turning to threat intelligence to increase their understanding of attacker campaigns, behavior, and tools.

An understanding of the relevant threat landscape is key to making decisions on how best to manage digital risk. However, the pace of change of this landscape - its diversity of actors, behaviors and tools means time and resources are often wasted on the irrelevant or out of date information.

At Digital Shadows, we take a more relevant approach; producing tailored and curated analyses of threat actors, and identifying exposed assets presenting opportunities to those actors. For example, SearchLight also identifies exposed credentials and removes phishing sites. With a range of mitigation options, this helps to reduce the opportunities adversaries have and disrupts their efforts.

 

Previous Post
Dark Web Search Engine Kilos: Tipping the Scales in Favor of Cybercrime
Dark Web Search Engine Kilos: Tipping the Scales in Favor of Cybercrime

With the recent indictment of Larry Harmon, alleged operator of the Bitcoin tumbling service Helix and dark...

Next Post
Cyber Threat Intelligence Frameworks: 5 Rules for Integrating These Frameworks
Cyber Threat Intelligence Frameworks: 5 Rules for Integrating These Frameworks

This blog discusses how different CTI frameworks can co-exist, and suggests some practical rules to bear in...