Videos

Watch our videos to learn more about digital risk protection and threat intelligence.

  • Beware of Phishers: New Research into the Ecosystem of Phishing40:31

    Beware of Phishers: New Research into the Ecosystem of Phishing

    In this webinar, Harrison Van Riper and Alex Guirakhoo walk through the Ecosystem of Phishing. The team will cover: 1. New phishing data findings 2. How cybercriminals are crafting and distributing ph

    Watch Video
  • ×

    Threat Model of a Remote Worker

    - Apr 16 -

    Live Webinar

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    Thank you!
    Error - something went wrong!
  • Dark Web vs Forums: Where to Focus Your Threat Hunting and Why1:06:03

    Dark Web vs Forums: Where to Focus Your Threat Hunting and Why

    Understand what the dark web really means, See where it can be useful, gain hands-on experience monitoring criminal sources, and learn about some free tools to get you started.

    Watch Video
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Unauthorized Commit to Public Code Repository Risk4:50

    Unauthorized Commit to Public Code Repository Risk

    An overview of the new "Unauthorized Commit" risk.

    Watch Video
  • Digital Shadows Company Overview Video3:05

    Digital Shadows Company Overview Video

    Hear from our co-founders on how we help your organization monitor and manage digital risk, providing relevant threat intelligence.

    Watch Video
  • Learn More About Digital Shadows SearchLight™

    Learn More
  • Dark Web Monitoring Use Case | Digital Shadows2:54

    Dark Web Monitoring Use Case | Digital Shadows

    Gain visibility into criminal and fraudulent activity impacting your brand on the deep and dark web. Learn more at https://www.digitalshadows.com/dark-web-monitoring/

    Watch Video
  • Breach! Exploring the Modern Digital Breach: Part 129:00

    Breach! Exploring the Modern Digital Breach: Part 1

    It seems like we read about new breaches every day. What’s changing? How is exposure and the adoption of digital technology changing the breach landscape? We have a special two-part series where Rick

    Watch Video
  • Digital Risk Protection and Threat Intelligence: An Overview2:13

    Digital Risk Protection and Threat Intelligence: An Overview

    Hear from co-founder of Digital Shadows, James Chappell, as he walks through the differences between Digital Risk Protection and Cyber Threat Intelligence. Resources Center: https://resources.digita

    Watch Video
  • Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study4:46

    Enabling Soi Dog’s Digital Transformation: A Digital Shadows Case Study

    Soi Dog, an animal charity, had been experiencing some issues around their digital security that was beginning to distract from their core operations and was concerning the management team.

    Watch Video
  • Your Data at Risk – Emerging Cyber Threats to Your Enterprise with the FBI Cyber Division56:13

    Your Data at Risk – Emerging Cyber Threats to Your Enterprise with the FBI Cyber Division

    The first half of 2019 has revealed no ebb in the number of massive data breaches and cybersecurity disasters. As the threat landscape continues to evolve and unfortunate enterprises have become the v

    Watch Video
  • Breach! Exploring the Modern Digital Breach: Part 228:13

    Breach! Exploring the Modern Digital Breach: Part 2

    What practical steps should organizations and the professionals within them be thinking about in this new world? We have a special two-part series where Rick Holland, VP Intelligence and CISO at Digit

    Watch Video
  • The Cybercriminal Forum is Not Dead | Recorded Webinar45:01

    The Cybercriminal Forum is Not Dead | Recorded Webinar

    With cybercriminals carrying out more transactions and discussions on alternative platforms, it would seem that forums would decrease. However, this does not seem to be materializing. In fact, forums

    Watch Video
  • Iranian Cyber Threats: Practical Advice for Security Professionals28:12

    Iranian Cyber Threats: Practical Advice for Security Professionals

    Rick Holland and Harrison Van Riper sit down to walk through Rick's latest blog on advice around the Iranian cyber threats.

    Watch Video
  • Iranian APT Groups’ Tradecraft Styles: Using Mitre ATT&CK™ and Essential 819:50

    Iranian APT Groups’ Tradecraft Styles: Using Mitre ATT&CK™ and Essential 8

    Rick Holland and Richard Gold talk through the team's research into Iranian APT groups' tradecraft styles using Mitre ATT&CK™ and the ASD Essential 8.

    Watch Video
  • Typosquatting and the 2020 U.S. Presidential election10:00

    Typosquatting and the 2020 U.S. Presidential election

    Photon Research Team thought it would be interesting to use this pool of candidates as a backdrop for research into typosquatted domains

    Watch Video
  • Data Leakage Detection Use Case | Digital Shadows3:27

    Data Leakage Detection Use Case | Digital Shadows

    Detect sensitive data that's been exposed by employees, contractors, or third parties. Learn more at https://www.digitalshadows.com/data-leakage-detection/

    Watch Video
  • Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar42:41

    Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar

    Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circula

    Watch Video
  • Phishing Protection Use Case | Digital Shadows0:00

    Phishing Protection Use Case | Digital Shadows

    Discover attackers impersonating your domains, social accounts, and mobile applications. Learn more at https://www.digitalshadows.com/phishing-protection/

    Watch Video
  • Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar55:16

    Best Practices Mitigating Risks to Data in Complex IT Ecosystems: Recorded Webinar

    Learn how complex enterprises rely on third party systems, networks and service providers and the associated steps they take to protect data.

    Watch Video
  • Strategies to Solve the Cyber Talent Gap and Protect Your IT Infrastructure - Recorded Webinar34:22

    Strategies to Solve the Cyber Talent Gap and Protect Your IT Infrastructure - Recorded Webinar

    Hear from Marc Crudgington, CISO at Woodforest Bank, about the innovative programs he’s put in place to protect his IT infrastructure with a limited staff.

    Watch Video
  • Photon Demonstration of Muraena2:46

    Photon Demonstration of Muraena

    Digital Shadows' Photon Team configured Muraena to phish credentials from a test Google account, and used the existing Necrobrowser functionality to automate the mining of the target’s Gmail inbox usi

    Watch Video
  • loading
    Loading More...