Threat Intelligence

9/27/2018
01:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Digital Shadows Launches Shadow Search

Service enables organizations to 'self-serve' and find cyber threats against them from the open, deep and dark web

Digital Shadows has today announced the availability of Shadow Search –- providing security analysts with a search tool to make better, more informed, and faster decisions to protect their organization from cyber threats.

Previously available as a key feature within Digital Shadows core SearchLight, Shadow Search is now available as a subscription-based service on its own for teams who want to self-serve looking for threats from the open, deep, and dark web.

Shadow Search delivers threat insight with context through:

Immediate access: instant access to strategic, tactical and technical threat intelligence via a single intuitive interface.

Extensive coverage: a data repository including curated strategic threat intelligence, exploit and vulnerability information, and raw threat intelligence from the open, deep, and dark web.

Actionable information: accurate results with associated observables, an intuitive interface and full export, allowing analysts to make faster searches and more rapid use of the intelligence they find.

Relevant results: smart filters and a powerful search syntax enable analysts to rapidly focus on the most relevant information.

For the last seven years, Digital Shadows has amassed a collection of historical, evolving and real-time threat intelligence assets, and enabled access to complimentary expert security sources. Shadow Search provides subscribers with access to this data and the ability to better manage their third-party risk, investigate security incidents, monitor trends and enrich threat hunting of client-specific indicators and threat actors jeopardizing their business, brand and reputation.

Alastair Paterson, CEO of Digital Shadows explains: "For the last six months, existing SearchLight customers have been using Shadow Search to ‘self-serve’ and discover for themselves the array of threats on the criminal web that are lined up against them. Threats they have uncovered include malicious domains, compromised data and criminal 'chatter' directed against their organization. Many have also discovered evidence of accidental data loss. Shadow Search empowers organizations to mitigate these threats. Making it available as a standalone product will greatly enhance the breadth of organizations that can take advantage of the unique insight only Digital Shadows can bring to them."

In July 2018, Digital Shadows was named a "Leader" in The Forrester New Wave: Digital Risk Protection, Q3 2018 and a differentiated rating in nine criteria including: Web risk protection, dark web recon, digital risk analysis and review, business attribution & asset mapping, dashboard & UI, DRP breadth & depth, vision and execution, global reach & analyst support and thought leadership & strategic partnerships. In this digital risk protection evaluation, the report remarked that "Customers extol Digital Shadows for its robust digital risk data and ability to deliver on an aggressive product road map, citing a new queryable deep and dark web search feature as evidence."

Nick Hayes, lead Forrester analyst of the report, wrote: "Digital Shadows keeps getting closer to an all-in-one solution to monitor and mitigate external risk exposure online. Its rich partner ecosystem, including security technology vendors, regional legal services, and law enforcement, adds further value for all customers."

For more details on Shadow Search and for a free seven day trial please visit https://info.digitalshadows.com/test-drive-registration.html

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11378
PUBLISHED: 2019-04-20
An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code.
CVE-2019-11372
PUBLISHED: 2019-04-20
An out-of-bounds read in MediaInfoLib::File__Tags_Helper::Synched_Test in Tag/File__Tags.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.
CVE-2019-11373
PUBLISHED: 2019-04-20
An out-of-bounds read in File__Analyze::Get_L8 in File__Analyze_Buffer.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.
CVE-2019-11374
PUBLISHED: 2019-04-20
74CMS v5.0.1 has a CSRF vulnerability to add a new admin user via the index.php?m=Admin&c=admin&a=add URI.
CVE-2019-11375
PUBLISHED: 2019-04-20
Msvod v10 has a CSRF vulnerability to change user information via the admin/member/edit.html URI.