Cyber Threat Intelligence is brought to you by Digital Shadows’ Photon Research Team. Composed of security researchers, linguists, security practitioners and intelligence analysts, this team of global experts produces timely finished intelligence with a bias towards actionability. Within Photon, there is a dedicated Closed Sources team— ensuring users have access to intelligence from top tier cybercriminal locations, regardless of language or cybercriminal community access.
This guide outlines best practices for cyber threat intelligence and features resources to leverage when de...
Digital Shadows Named #1 in Digital Risk ProtectionRead Report
Other content in this Stream
This guide outlines best practices for cyber threat intelligence and features resources to leverage when developing or improving your organization's cyber threat intelligence capabilities.
This illustration of the intelligence cycle will allow you to see what we do at each stage of the cycle to ensure we effectively answer stakeholder requirements.
Digital Shadows has contributed to Optiv's 2020 Threat Intelligence Landscape Estimate, which provides a view of the cyber-threat landscape to help organizations mitigate risk and strengthen their...
Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence ...
A compilation of some of our favorite readings, resources, and tools that relate to Cyber Threat Intelligence.
As the leader in threat intel and drp SearchLight is the most comprehensive and awarded solution available. Ready to learn a better way to tackle Threat Intelligence? Get started today!
ShadowTalk hosts Sean, Rick, Ivan, and Austin bring you the latest in threat intelligence. This week they cover the Mozi arrest, Fortinet credentials, and Splunk PowerShell Release.
ShadowTalk hosts Adam, Dylan and Kim bring you the latest in threat intelligence.
ShadowTalk hosts Sean, Alec, Rick, and Ivan bring you the latest in threat intelligence. They cover CISA guidelines on frequently exploited vulnerabilities , Q2 Ransomware and PunkSpider.
ShadowTalk hosts Stefano, Saul, Rory, and Kim cover Microsoft Exchange attribution, NSO Spyware, Zero-days, and Clippy.
This week covers: Kaseya announces patches have been pushed to VSA SaaS platform, REvil going dark, and an update to the PrintNightmare situation.
ShadowTalk hosts Stefano, Dylan, Adam, and Xue, bring you the latest in threat intelligence.
A vulnerability in Kaseya’s virtual system/server administrator (VSA) software has been exploited to deliver the “REvil” ransomware to multiple managed service providers.
ShadowTalk hosts Stefano, Chris, and Kim, bring you the latest in threat intelligence.
Several Clop members were arrested in association with money laundering, and the officials seized infrastructure the group has used in ransomware attacks globally.
ShadowTalk hosts Sean, Ivan, and Charles bring you the latest in threat intelligence.
ShadowTalk hosts Stefano, Adam, Chris, and newcomer, Rory, bring you the latest in threat intelligence.
The notorious Russia-based ransomware group “REvil” (aka Sodinokibi) has been blamed for the latest high-profile ransomware attack, on the world’s largest meat supplier.