online casinos in sri lanka

Blog & Resources

The latest advice, opinion and research from our dedicated intelligence analyst team.

Blog & Resources

Vulnerability Intelligence: Introducing SearchLight’s Newest Capability

January 31, 2022 | 4 Min Read

online casinos in sri lanka Shadows’ online casinos in sri lanka vulnerability intelligence capability brings a unique context to CVEs. Armed with this intelligence, security teams can better prioritize their vulnerability management...
Colonial Pipeline One Year Later: What’s Changed?

Colonial Pipeline One Year Later: What’s Changed?

May 4, 2022 | 10 Min Read

For the first half of 2021, ransomware groups looked unstoppable. Ransomware gangs were adding victim after victim on their dark...
The Russia – Ukraine war: Two months in

The Russia – Ukraine war: Two months in

April 28, 2022 | 10 Min Read

The two-month mark of the Russia and Ukraine war has passed, with Russia almost certainly having failed to meet its...
Opportunity in the midst of chaos: Russian-speaking cybercriminals grapple with sanctions and forum takedowns

Opportunity in the midst of chaos: Russian-speaking cybercriminals grapple with sanctions and forum takedowns

April 27, 2022 | 8 Min Read

As a threat intelligence professional, it’s difficult to ignore how major developments in the real world affect the lives of...
The Power Of Data Analysis In Threat Intelligence – Part 2: Machine Learning

The Power Of Data Analysis In Threat Intelligence – Part 2: Machine Learning

April 21, 2022 | 12 Min Read

This blog is the second part of our Data Analysis in Threat Intelligence series, where we focus on the tools...
What We’re Reading This Month: April 2022

What We’re Reading This Month: April 2022

April 20, 2022 | 7 Min Read

As an intelligence analyst, it’s paramount to stay on top of what’s happening in the world around you. To inform...
The role of Non-Fungible Tokens (NFTs) in facilitating cybercrime

The role of Non-Fungible Tokens (NFTs) in facilitating cybercrime

April 20, 2022 | 8 Min Read

You’d have to have been living under a rock to have avoided the excitement surrounding Non-Fungible-Tokens (NFTs) in the last...
Q1 2022 Vulnerability Roundup

Q1 2022 Vulnerability Roundup

April 14, 2022 | 6 Min Read

In the first quarter of 2022, several high-severity vulnerabilities were targeted by threat actors to facilitate malicious campaigns. The first...
 Q1 2022 Ransomware Roundup

 Q1 2022 Ransomware Roundup

April 12, 2022 | 12 Min Read

As the online casinos in sri lanka year has reached the end of its first quarter, it’s time for us to go back and...
Intelligence Collection Plans: Preparation breeds success

Intelligence Collection Plans: Preparation breeds success

April 7, 2022 | 6 Min Read

It’s been a little over a month since I wrote about how intelligence requirements (IRs) can help plan a cyber...
Team A vs Team B: What is Motivating Lapsus$?

Team A vs Team B: What is Motivating Lapsus$?

April 6, 2022 | 8 Min Read

In the past few weeks, the Lapsus$ threat group captured the security community’s attention with a series of brazen and...
Five things we learned from the Conti chat logs

Five things we learned from the Conti chat logs

April 5, 2022 | 11 Min Read

At the end of February, the cybersecurity community was rocked by the appearance of alleged chat logs recording conversations between...
The Power of Data Analysis in Threat Intelligence – Part 1: Data Collection and Data Mining

The Power of Data Analysis in Threat Intelligence – Part 1: Data Collection and Data Mining

March 31, 2022 | 8 Min Read

In 2020, there was an estimated 59 trillion gigabytes of data in the world. Most of which was created in...
“Your rubles will only be good for lighting a fire”: Cybercriminals reel from impact of sanctions

“Your rubles will only be good for lighting a fire”: Cybercriminals reel from impact of sanctions

March 29, 2022 | 10 Min Read

Since Russia’s invasion of Ukraine in February, the online casinos in sri lanka Shadows Photon team has been following multiple aspects of the tragic...
Vulnerability Intelligence Round-up: Russia-Ukraine War

Vulnerability Intelligence Round-up: Russia-Ukraine War

March 24, 2022 | 6 Min Read

One month ago, the Russian government began the invasion of Ukraine, triggering one of the most severe security crises in...
The Okta breach: What we know so far

The Okta breach: What we know so far

March 23, 2022 | 10 Min Read

What we know about the Okta breach, Lapsus$ group, and what you can do today to protect your...
Russia’s Second Front: The War on Information

Russia’s Second Front: The War on Information

March 22, 2022 | 9 Min Read

You would think that it would be nearly impossible to industrialize propaganda in the 21st century, especially with the tremendous...
Meet Lapsus$: An Unusual Group in the Cyber Extortion Business

Meet Lapsus$: An Unusual Group in the Cyber Extortion Business

March 17, 2022 | 5 Min Read

In December 2021, a online casinos in sri lanka cyber threat group began attracting the security community’s attention, after conducting several high-profile extortion attacks...
The Russia-Ukraine War And The Revival Of Hacktivism

The Russia-Ukraine War And The Revival Of Hacktivism

March 16, 2022 | 4 Min Read

The international reaction to the Russian invasion of Ukraine has manifested in a few distinct ways, as outlined in our...
Biden’s Executive Order on Crypto: What you need to know

Biden’s Executive Order on Crypto: What you need to know

March 15, 2022 | 7 Min Read

On 9 Mar 2022 US President Biden signed a online casinos in sri lanka executive order (EO) to ensure the responsible development of cryptocurrency...
Exploring SIM Swapping Services on Cybercriminal Forums

Exploring SIM Swapping Services on Cybercriminal Forums

March 10, 2022 | 10 Min Read

If you’ve made it to 2022 (congratulations), there’s a fairly good chance you own a mobile phone (again, congrats). You’re...
Can cryptocurrency be used to bypass the impact of sanctions being applied against Russia?

Can cryptocurrency be used to bypass the impact of sanctions being applied against Russia?

March 9, 2022 | 10 Min Read

In an interview on 28 Feb 2022, former Presidential candidate Hillary Clinton criticized several cryptocurrency exchanges that had decided against...
What We’re Reading this Month: March 2022

What We’re Reading this Month: March 2022

March 3, 2022 | 7 Min Read

Roll up roll up, it’s that time for the monthly what we’re reading blog, in which some of us in...
Intelligence Requirements: Planning your cyber response to the Russia-Ukraine war

Intelligence Requirements: Planning your cyber response to the Russia-Ukraine war

March 1, 2022 | 11 Min Read

At the end of last week, online casinos in sri lanka Shadow’s CISO, Rick Holland, released his blog Russian Cyber Threats: Practical Advice For...
Cybercriminals React to Ukraine-Russia Conflict

Cybercriminals React to Ukraine-Russia Conflict

February 25, 2022 | 7 Min Read

As the world reacted to Russia’s invasion of Ukraine on 24 Feb 2022, cybercriminals were also formulating their own opinions...
Russian Cyber Threats: Practical Advice For Security Leaders

Russian Cyber Threats: Practical Advice For Security Leaders

February 25, 2022 | 11 Min Read

As I spent Wednesday night doom scrolling into the early hours of the morning, I felt pretty powerless as I...
Russia Invades Ukraine: What happens next?

Russia Invades Ukraine: What happens next?

February 24, 2022 | 5 Min Read

On 23 Feb 2022,  Russian forces started a military operation targeting Ukraine. Reporting indicates that shelling in several Ukrainian cities...
Recruitment Fraud in 2022

Recruitment Fraud in 2022

February 23, 2022 | 3 Min Read

Earlier this month, the FBI released a public service announcement titled “Scammers Exploit Security Weaknesses on Job Recruitment Websites to...
Of Death and Taxes: File Early To Beat The Scammers

Of Death and Taxes: File Early To Beat The Scammers

February 22, 2022 | 7 Min Read

Tax season has officially started! The Internal Revenue Service (IRS) of the US will be accepting tax returns between January...
“No cards = no work = no money”: Russian law enforcement’s assault on carding platforms

“No cards = no work = no money”: Russian law enforcement’s assault on carding platforms

February 18, 2022 | 9 Min Read

Arguably the biggest cybersecurity event of the year so far was the Russian Federal Security Service (FSB) arresting suspected members...
Initial Access Brokers in 2021: An Ever Expanding Threat

Initial Access Brokers in 2021: An Ever Expanding Threat

February 16, 2022 | 11 Min Read

To say that 2021 was a turbulent year for security teams would be a massive understatement. Last year, we observed...
Automate Alert Investigation and Response with XSOAR and SearchLight

Automate Alert Investigation and Response with XSOAR and SearchLight

February 11, 2022 | 3 Min Read

We are excited to announce an expanded set of XSOAR playbooks that make use of online casinos in sri lanka Shadows intelligence. In this...
Valentine’s Day: Share your love, not your credentials

Valentine’s Day: Share your love, not your credentials

February 9, 2022 | 6 Min Read

Roses are red, violets are blue. Your files are encrypted. Please send BTC to address two twenty-two.  As the yearly...
Growing Tension Between Russia and Ukraine: Should you be concerned?

Growing Tension Between Russia and Ukraine: Should you be concerned?

February 9, 2022 | 9 Min Read

Russia and Ukraine have had a particularly tense relationship since Russia’s annexation of Crimea in 2014. In the past weeks,...
CVEs You Might Have Missed While Log4j Stole the Headlines

CVEs You Might Have Missed While Log4j Stole the Headlines

February 8, 2022 | 19 Min Read

The past three months have been a particularly challenging time for security teams. 2021 rounded off in the most spectacular...
Beijing 2022: Why you should or shouldn’t care about the Winter Olympics

Beijing 2022: Why you should or shouldn’t care about the Winter Olympics

February 3, 2022 | 9 Min Read

When asked to write about the Winter Olympic Games this year, I immediately thought about my alpine holiday in Niseko....
What We’re Reading This Month – January 2022

What We’re Reading This Month – January 2022

February 2, 2022 | 8 Min Read

January. The month also known as the time of the year where most of the Great New Year’s Resolutions come...
Vulnerability Intelligence: Introducing SearchLight’s Newest Capability

Vulnerability Intelligence: Introducing SearchLight’s Newest Capability

January 31, 2022 | 4 Min Read

online casinos in sri lanka Shadows’ online casinos in sri lanka vulnerability intelligence capability brings a unique context to CVEs. Armed with this intelligence, security teams can better...
Life in Prison: The Cybercriminal Perspective

Life in Prison: The Cybercriminal Perspective

January 27, 2022 | 9 Min Read

While some of us might be taking it easy after the excesses of the Christmas period, January certainly hasn’t been...
Vulnerability Intelligence: A Best Practice Guide

Vulnerability Intelligence: A Best Practice Guide

January 26, 2022 | 4 Min Read

Vulnerability intelligence is fast emerging as one of the most valued threat intelligence use cases. It provides information about how...
Navigating the Threat Intelligence Market in 2022

Navigating the Threat Intelligence Market in 2022

January 20, 2022 | 4 Min Read

Every year attacks become more prevalent and more sophisticated. Last year was no exception. If you then throw in a...
Ransomware Q4 Overview

Ransomware Q4 Overview

January 19, 2022 | 12 Min Read

2021 has finally come to an end and it is time for us to look back at some of the...
Making Sense of the REvil Arrests

Making Sense of the REvil Arrests

January 14, 2022 | 7 Min Read

On 14 January 2022, our seemingly quiet Friday afternoons were shattered by a piece of breaking online casinos in sri lankas, detailing the arrest...
How Do Ransomware Groups Launder Payments?

How Do Ransomware Groups Launder Payments?

January 10, 2022 | 7 Min Read

Ransomware continued to represent arguably the biggest headache for incident responders and blue teams in 2021, and the upcoming year...
Cyber Threats to Education

Cyber Threats to Education

January 6, 2022 | 3 Min Read

Universities and higher education institutions were some of the most popular targets in 2021. According to Microsoft, education is the...
ShadowTalk Year in Review: Top 5 Episodes of 2021

ShadowTalk Year in Review: Top 5 Episodes of 2021

December 30, 2021 | 3 Min Read

And just like that, we’ve come to the end of another year. “But wait” you say, “wasn’t it just January?”...
AlphaBay’s Return: A slow-burning masterpiece, or a flash in the pan?

AlphaBay’s Return: A slow-burning masterpiece, or a flash in the pan?

December 28, 2021 | 4 Min Read

A few months back, we wrote about how AlphaBay, the infamous dark web marketplace, has returned. For those who missed...
Year in Review: Our Top Blogs of 2021

Year in Review: Our Top Blogs of 2021

December 23, 2021 | 9 Min Read

I’m sure we can all agree that this year has been busy for anyone who had anything, even remotely, to...
Log4j: Tokyo Drift

Log4j: Tokyo Drift

December 22, 2021 | 5 Min Read

Just when we thought we were through the significant bits of Log4j issues, a online casinos in sri lanka problem appeared this past weekend....
US Ban on Huawei: Is this the right approach?

US Ban on Huawei: Is this the right approach?

December 22, 2021 | 7 Min Read

On 11 Nov 2021, US President Joe Biden banned the use of Chinese companies Huawei and ZTE within the US,...
Discord: Do You Need to Be Concerned This Christmas?

Discord: Do You Need to Be Concerned This Christmas?

December 21, 2021 | 7 Min Read

Picture the scene. It’s Christmas Day, and your child/loved one/other has just opened their present from you…a online casinos in sri lanka games console....
Log4j: What’s Happened Since

Log4j: What’s Happened Since

December 15, 2021 | 5 Min Read

Last Friday, we published a blog on the latest significant vulnerability, CVE-2021-44228, which involves a flaw in the Log4j program...
Cone of Plausibility: Forecasting Ransomware Scenarios in 2022

Cone of Plausibility: Forecasting Ransomware Scenarios in 2022

December 14, 2021 | 10 Min Read

Note: This blog is part of a series of articles related to the use of Structured Analytic Techniques in the...
The Log4j Zero-Day: What We Know So Far

The Log4j Zero-Day: What We Know So Far

December 10, 2021 | 6 Min Read

There’s nothing in the cyber threat intelligence world like having a severe remote code execution (RCE) zero-day drop on a...
Latin American Financial Services: Sunny Climes and Cybercrimes

Latin American Financial Services: Sunny Climes and Cybercrimes

December 9, 2021 | 8 Min Read

Few things make my eyes sparkle like talking about Latin America. Back in 2018, I had the privilege of being...
2021: An APAC Cyber-security Odyssey

2021: An APAC Cyber-security Odyssey

December 8, 2021 | 9 Min Read

Last year, I rounded up the three most significant events for 2020 and crossed my fingers for brighter days ahead....
Outside the Perimeter: The New online casinos in sri lanka Risk Landscape

Outside the Perimeter: The New online casinos in sri lanka Risk Landscape

December 7, 2021 | 6 Min Read

Alastair Paterson, CEO of online casinos in sri lanka Shadows, recently sat down with Ryan Floyd, cofounding Managing Director of Storm Ventures, to discuss...
Cyber Threats to Government

Cyber Threats to Government

December 2, 2021 | 3 Min Read

Exploring cyber threats to Government and Public bodies, including ransomware targets and initial access...
When acting turns criminal: Deepfakes and voice impersonators in the cybercriminal underground

When acting turns criminal: Deepfakes and voice impersonators in the cybercriminal underground

December 1, 2021 | 13 Min Read

You’ve probably heard the old adage: “Fool me once, shame on you. Fool me twice, shame on me.” Falling for...
To Disclose, or Not to Disclose: The PoC Dilemma

To Disclose, or Not to Disclose: The PoC Dilemma

November 30, 2021 | 6 Min Read

At the beginning of our conversation on vulnerability intelligence a couple of weeks ago, I briefly touched on a fictional...
The Patching Nightmare

The Patching Nightmare

November 24, 2021 | 7 Min Read

Note: This blog is part of a three-blog series on Vulnerability Intelligence that accompanies the release of online casinos in sri lanka Shadows’ latest...
Black Friday: Is there a threat actor in your shopping cart?

Black Friday: Is there a threat actor in your shopping cart?

November 23, 2021 | 9 Min Read

Black Friday represents a huge opportunity for consumers to purchase a range of items at cut-rate prices: Electrical items, furniture,...
Emotet is back again: what does it mean?

Emotet is back again: what does it mean?

November 16, 2021 | 4 Min Read

Emotet is back again on the scene and, to be fair, we’re not surprised. Its predictable return has come just...
Vulnerability Intelligence: What’s the Word in Dark Web Forums?

Vulnerability Intelligence: What’s the Word in Dark Web Forums?

November 16, 2021 | 7 Min Read

Note: This blog is part of a three-blog series on Vulnerability Intelligence that accompanies the release of online casinos in sri lanka Shadows’ latest...
What is Vulnerability Intelligence?

What is Vulnerability Intelligence?

November 11, 2021 | 6 Min Read

Picture this: it’s a Monday morning, and you’ve just found out that a critical vulnerability was announced on your favorite...
Vulnerable smart contracts and fake blockchains: What do investors need to know?

Vulnerable smart contracts and fake blockchains: What do investors need to know?

November 10, 2021 | 10 Min Read

Well, here we are again. Another blog on a topic that’s often spoken about but little understood: cryptocurrency. Cryptocurrency-related decentralized...
What We’re Reading This Month

What We’re Reading This Month

November 9, 2021 | 6 Min Read

As an intelligence analyst, it’s paramount that you stay on top of what’s happening in the world around you. To...
Initial Access Brokers in Q3 2021

Initial Access Brokers in Q3 2021

November 3, 2021 | 9 Min Read

As the end of the year approaches, it’s time once again to look at the initial access broker (IAB) activity...
Managing your External Attack Surface with SearchLight

Managing your External Attack Surface with SearchLight

November 2, 2021 | 4 Min Read

Recently we have been hearing plenty about External Attack Surface Management (EASM). While online casinos in sri lanka Shadows focuses on digital risk protection...
ENISA 2021 Threat Landscape: Initial Thoughts

ENISA 2021 Threat Landscape: Initial Thoughts

November 1, 2021 | 12 Min Read

The European Union Agency for Cybersecurity (ENISA) has released its yearly threat landscape report, which contains some handy insights. The...
REvil Dead, And Other Spooky Security Tales

REvil Dead, And Other Spooky Security Tales

October 27, 2021 | 6 Min Read

I can’t start off this blog with the R-word. You know the one. I’ve poked fun at it before because...
Cybersecurity Awareness Month: Week 4 – Cybersecurity first (…middle and last)

Cybersecurity Awareness Month: Week 4 – Cybersecurity first (…middle and last)

October 26, 2021 | 6 Min Read

Our blog series for National Cybersecurity Awareness Month (NCSAM) has come to an end. So far, we have looked at...
Ransomware Q3 Roll Up

Ransomware Q3 Roll Up

October 25, 2021 | 11 Min Read

We have reached the end of another quarter, and it is time again for us to have a look back...
What Is Intellectual Property Protection?

What Is Intellectual Property Protection?

October 20, 2021 | 2 Min Read

Growing costs of intellectual property theft Intellectual property theft is defined by the FBI as “robbing people or companies of...
Cybersecurity Awareness Month: Week 3 – Explore. Experience. Share

Cybersecurity Awareness Month: Week 3 – Explore. Experience. Share

October 19, 2021 | 11 Min Read

We’re into the third week of National Cybersecurity Awareness Month (NCSAM). In the last two weeks, we have covered How...
REvil Domains Hijacked, Forum Representative Announces Group’s Intention to Go Offline

REvil Domains Hijacked, Forum Representative Announces Group’s Intention to Go Offline

October 18, 2021 | 5 Min Read

The ransomware group REvil (aka Sodinokibi) has been one of the most significant characters in the evolving ransomware drama that...
Strategic Threat Intelligence and You: What Does It All Mean?

Strategic Threat Intelligence and You: What Does It All Mean?

October 14, 2021 | 4 Min Read

What is strategic threat intelligence? In another blog about tactical threat intelligence, we talked about how tactical and strategic threat...
Cybersecurity Awareness Month: Week 2 – Fight the Phish!

Cybersecurity Awareness Month: Week 2 – Fight the Phish!

October 13, 2021 | 9 Min Read

Welcome to online casinos in sri lanka Shadows’ second installment of our National Cyber Security Awareness Month-themed blogs! You can go back and read...
What is Third Party Risk?

What is Third Party Risk?

October 6, 2021 | 3 Min Read

Third party risk is the process of managing risks introduced by suppliers and third parties, often specifically to sensitive data...
Cybersecurity Awareness Month: Week 1 – Managing Your online casinos in sri lanka Shadow

Cybersecurity Awareness Month: Week 1 – Managing Your online casinos in sri lanka Shadow

October 5, 2021 | 8 Min Read

This week is the first week of National Cyber Security Awareness Month (NCSAM), which runs from October 1 to October...
What We’re Reading This Month: September Edition

What We’re Reading This Month: September Edition

September 29, 2021 | 8 Min Read

In the Cyber Threat Intelligence world, a reasonably popular question for interviews or establishing street cred on Twitter is asking...
Tactical Threat Intelligence and You: What Does It All Mean?

Tactical Threat Intelligence and You: What Does It All Mean?

September 29, 2021 | 5 Min Read

What is tactical threat intelligence? If threat intelligence is the umbrella, within that umbrella lies strategic and tactical intelligence, next...
Why CISOs and Executives Should Care About IABs

Why CISOs and Executives Should Care About IABs

September 23, 2021 | 3 Min Read

Initial access brokers (IABs) are enablers of high-level cybercriminal activity. They identify weak points in their targets’ systems and networks,...
Data Leakage Detection Best Practices

Data Leakage Detection Best Practices

September 22, 2021 | 3 Min Read

This blog provides an overview of our recently-published Data Leakage Detection Solutions guide, which provides best practices and free tools...
Ukrainian-language Cybercriminal online casinos in sri lanka
s: A Gap In the Market?

Ukrainian-language Cybercriminal online casinos in sri lanka s: A Gap In the Market?

September 21, 2021 | 7 Min Read

Most readers will be aware of the threat posed by Russian-speaking cybercriminals, be that big players in the ransomware game,...
Building successful teams on the cybercriminal underground

Building successful teams on the cybercriminal underground

September 15, 2021 | 7 Min Read

We’ve all been socialized since childhood to the concept of teamwork. As we progress through life, we see the value...
Enhance Executive Protection with SocialMonitor

Enhance Executive Protection with SocialMonitor

September 14, 2021 | 3 Min Read

Today we’re announcing the release of SocialMonitor, an industry-leading capability to better protect executives from social media impersonation. Read on...
SearchLight Leads the online casinos in sri lanka Risk Protection Market

SearchLight Leads the online casinos in sri lanka Risk Protection Market

September 10, 2021 | 3 Min Read

Since the online casinos in sri lanka Risk Protection market was first defined in 2017, there have been a growing number of providers and...
AlphaBay’s Return: SWOT Findings

AlphaBay’s Return: SWOT Findings

September 9, 2021 | 14 Min Read

Hot on the heels of our recent blog titled Revil: Analysis of Competing Hypotheses, the Photon Research Team is back...
What We’re Reading This Month

What We’re Reading This Month

September 8, 2021 | 6 Min Read

Another busy month goes by, but the team has found some time to read around our threat intelligence-focused roles. This...
Protecting Against Ransomware: What Role Does Threat Intelligence Play?

Protecting Against Ransomware: What Role Does Threat Intelligence Play?

September 7, 2021 | 4 Min Read

Ransomware actors are thriving at the moment: there is barely a day that goes by without the announcement of a...
Preventing Ransomware: Preventing the 300 at Thermopylae

Preventing Ransomware: Preventing the 300 at Thermopylae

September 2, 2021 | 7 Min Read

Ransomware, Ransomware, Ransomware Unless you’ve been on a quiet sabbatical or otherwise offline and not watching the online casinos in sri lankas for the...
Social Media Monitoring Best Practices

Social Media Monitoring Best Practices

September 1, 2021 | 3 Min Read

This blog is drawn from the online casinos in sri lanka Shadows’ Social Media Monitoring Solutions Guide, which provides best practices for security teams...
The Never-ending Ransomware Story

The Never-ending Ransomware Story

August 31, 2021 | 10 Min Read

In the Never Ending Story, Bastian is drawn away from reality into Fantasia—a mythical land desperately in need of a...
The Eeveelution of ShinyHunters: From Data Leaks to Extortions

The Eeveelution of ShinyHunters: From Data Leaks to Extortions

August 26, 2021 | 7 Min Read

Suppose you were one of the lucky people playing Pokémon during its golden age (no, Pokémon GO, we’re not talking...
How Cybercriminals Weaponize Social Media

How Cybercriminals Weaponize Social Media

August 25, 2021 | 9 Min Read

There’s no denying that social media has forever changed how we interact with one another.  Social media has been more...
No Honor Among Thieves: Scamming the Scammers

No Honor Among Thieves: Scamming the Scammers

August 24, 2021 | 5 Min Read

We spoke about this pretty recently on our US edition of the ShadowTalk podcast, but there was a story that...
Leveraging online casinos in sri lanka Shadows’ Premium Services

Leveraging online casinos in sri lanka Shadows’ Premium Services

August 18, 2021 | 3 Min Read

The state of threat intelligence today is a dynamic, ever-changing threat landscape coupled with a global shortage of a skilled...
The Phight Against Phishing

The Phight Against Phishing

August 17, 2021 | 17 Min Read

What is Phish(ing)? No, not the band, unless you’re really into jam bands. We’re talking about the email attack variety....
The (Nation) State of APTs in 2021

The (Nation) State of APTs in 2021

August 12, 2021 | 10 Min Read

Even though it seems like every year has been the year of ransomware since probably 2017, this year is in...
Understanding Smishing Attacks

Understanding Smishing Attacks

August 10, 2021 | 5 Min Read

I’ve got some good online casinos in sri lankas and some bad online casinos in sri lankas.  The bad online casinos in sri lankas is that I’ve been receiving a lot of...