Whitepapers & Reports

Check out our research reports around important digital risks to your organization.

  • Dark Web Monitoring Solutions Guide

    Dark Web Monitoring Solutions Guide

    This guide shares years of operational best practices and expands on where dark web intelligence is useful and can be effectively leveraged into action for security teams.

    Read Report
  • Operationalizing Cyber Threat Intelligence with SearchLight

    On-demand Webinar

    Watch Here
  • ×

    Cybercrime Takeaways from the Verizon DBIR

    - Live Webinar - June 29th

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2021Jun29 - Prospect Webinar - Verizon DBIR
    Thank you!
    Error - something went wrong!
  • Q1 2021 Cyber Threat Report: Healthcare & Pharma Threats

    Q1 2021 Cyber Threat Report: Healthcare & Pharma Threats

    This report discusses Intel Updates affecting the healthcare and pharmaceutical sectors in the first quarter of 2021 (Q1 2021).

    Read Report
  • Q1 2021 Cyber Threat Report: Retail

    Q1 2021 Cyber Threat Report: Retail

    This report discusses Intel Updates affecting the retail sector in the first quarter of 2021 (Q1 2021).

    Read Report
  • Q1 2021 Cyber Threat Report: Insurance

    Q1 2021 Cyber Threat Report: Insurance

    This report discusses Intel Updates affecting the insurance sector in the first quarter of 2021 (Q1 2021).

    Read Report
  • Q1 2021 Cyber Threat Report: Media & Telecommunications

    Q1 2021 Cyber Threat Report: Media & Telecommunications

    This report discusses Intel Updates affecting the media and telecommunications sector in the first quarter of 2021 (Q1 2021).

    Read Report
  • Learn More About Digital Shadows SearchLight™

    Learn More
  • Initial Access Brokers: A Deep Dive

    On-demand Webinar

    Watch Here
  • Q1 2021 Cyber Threat Report: Ransomware

    Q1 2021 Cyber Threat Report: Ransomware

    This report discusses Intel Updates related to ransomware in the first quarter of 2021 (Q1 2021).

    Read Report
  • Q1 2021 Cyber Threat Report: Travel & Leisure Threats

    Q1 2021 Cyber Threat Report: Travel & Leisure Threats

    This report discusses Intel Updates affecting the travel-and-leisure sector in the first quarter of 2021 (Q1 2021).

    Read Report
  • Q1 2021 Cyber Threat Report: Energy Threats

    Q1 2021 Cyber Threat Report: Energy Threats

    This report discusses cyber events affecting the energy sector in the first quarter of 2021 (Q1 2021).

    Read Report
  • Your Practical Guide to Reducing Digital Risk

    Get Your Copy!
  • Q1 2021 Cyber Threat Report: CVE Threats

    Q1 2021 Cyber Threat Report: CVE Threats

    This report discusses cyber incidents involving the exploitation of common vulnerabilities and exposures (CVEs) in the first quarter of 2021.

    Read Report
  • Q1 2021 Cyber Threat Report: Finance Threats

    Q1 2021 Cyber Threat Report: Finance Threats

    This report discusses cyber events affecting the financial services sector in the first quarter of 2021 (Q1 2021).

    Read Report
  • Q1 2021 Cyber Threat Report: Technology Threats

    Q1 2021 Cyber Threat Report: Technology Threats

    This report discusses cyber incidents affecting the technology sector in the first quarter of 2021 (Q1 2021).

    Read Report
  • Cyber Threat Intelligence Solutions Guide

    Cyber Threat Intelligence Solutions Guide

    This guide outlines best practices for cyber threat intelligence and features resources to leverage when developing or improving your organization's cyber threat intelligence capabilities.

    Read Report
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Initial Access Brokers Report

    Initial Access Brokers Report

    Initial access brokers are benefitting from a rise in adoption of remote access software. This Initial Access Brokers Report analyzes this phenomenon and what it means for security practitioners.

    Read Report
  • Exposed Credentials Solutions Guide

    Exposed Credentials Solutions Guide

    This guide draws from best practices suggested in SearchLight’s playbooks, so security professionals can improve their tools and processes to prevent employee account takeover.

    Read Report
  • From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

    From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

    Over the past 2.5 years, we have been analyzing how cybercriminals conspire to prey upon users of online services by “taking over” the accounts they all use...

    Read Report
  • 2020 Cyber Threat Intelligence Estimate

    2020 Cyber Threat Intelligence Estimate

    Digital Shadows has contributed to Optiv's 2020 Threat Intelligence Landscape Estimate, which provides a view of the cyber-threat landscape to help organizations mitigate risk and strengthen their...

    Read Report
  • The Modern Cybercriminal Forum

    The Modern Cybercriminal Forum

    We took a deep-dive into the cybercriminal underground to investigate the persistence of forums, uncovering several reasons they remain attractive amid appealing alternatives.

    Read Report
  • WTF is Digital Risk Protection

    WTF is Digital Risk Protection

    A quick guide to understanding how your company looks to attackers.

    Read Report
  • Applying the Analysis of Competing Hypotheses to the Cyber Domain

    Applying the Analysis of Competing Hypotheses to the Cyber Domain

    We define the strengths and weaknesses of ACH in the cyber-threat domain, with a "customer-centric" view that can aid analysts in presenting intelligence to a decision maker.

    Read Report
  • Two-Factor in Review

    Two-Factor in Review

    A technical assessment of the most popular mitigation for account takeover attacks

    Read Report
  • loading
    Loading More...