Digital Shadows protects organizations from digital risks across the widest range of data sources within the open, deep, and dark web.
Learn more at https://resources.digitalshadows.com/
Boost Fertility New Invention Ups Success Rates.pdf
Data Sources - Digital Shadows
1. Data Sources
Your organization has spent years building its
customer base, brand reputation and public trust.
It only takes one misstep to undo that hard-won
customer trust. Digital Shadows protects organiza-
tions from digital risks across the widest range of
data sources within the open, deep and dark web.
The Most Comprehensive Approach to Digital Risk Management
Digital Shadows provides a holistic view of your digital risk profile including cyber threats, data exposure,
brand exposure, VIP exposure, infrastructure exposure, physical threat and third party risk. Not only do we
cover social media and the dark web, we also look for your assets across the widest range of threat intelli-
gence sources to produce a full view of your security posture and risk exposure over time.
Digital Shadows SearchLight™: Robust Visibility of Diverse Sources
The Digital Shadows platform is
complete, with good correlation
between actors, groups and
analysis of events.”
Security Leader, Banking Industry
Overview
The Most Comprehensive Approach to
Digital Risk Management
Digital Shadows provides a holistic view of your digital risk profile
including cyber threats, data exposure, brand exposure, VIP exposure,
infrastructure exposure, physical threat and third party risk. Not only do
we cover social media and the dark web, we also look for your assets
across the widest range of threat intelligence sources to produce a full
view of your security posture and risk exposure over time.
Data Sources
Your organization has spent years
building its customer base, brand
reputation and public trust. It only
takes one misstep to undo that hard-
won customer trust. Digital Shadows
protects organizations from digital
risks across the widest range of data
sources within the open, deep and
dark web.
“The Digital Shadows platform is
complete, with good correlation
between actors, groups and
analysis of events.”
Security Leader, Banking Industry
I17A
U.S. Headquarters
Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
Dallas, TX 75206
UK Headquarters
Digital Shadows, Ltd.
Level 39
One Canada Square
London E14 5AB
Robust Visibility of Diverse Sources
Automated Analysis
Irrelevant mentions are removed
through a combination of data
science and machine learning.
Human Analysis
Expert analysts verify automated
incidents, greatly reduce false
positives, conduct further
research, add context, and assign
a severity level.
Dissemination
Relevant, prioritized and actionable
incidents are delivered via our
SearchLight portal, email alerts
or API.
Planning and Collection
SearchLight continuously monitors the
open, deep, and dark web for mentions
of your company’s assets and unique
identifiers. Using a diverse range of
collection techniques,
Digital Shadows SearchLightTM
monitors across the broadest range
of data sources, including paste sites,
code repositories, mobile app stores,
social media and the dark web in
order to collect a full picture of your
organization’s digital risk.
Digital Shadows SearchLightTM
www.digitalshadows.com
2. Digital Shadows Provides Digital Risk Coverage Across the Widest Range of Data Sources
Digital Shadows monitors the broadest range of sources across the open, deep and dark web. We are
constantly expanding the range of sources that we cover as the threat landscape grows and changes. A
number of our collection methods use crawling or spidering techniques that are continuously identifying new
domains online. In addition, our analysts use various data analytics techniques to identify high value sources
and sites as they emerge.
Search engines that crawl and index web content that we can use
for brand coverage of pages that relate directly to your assets or to
broader threat activity.
Web Search Engines Google, Baidu
Paste Sites Pastebin, Ghostbin Sites widely used by to share data for a variety of purposes, from
colleagues sharing code snippets, to malicious actors sharing
sensitive breached data.
Code Repositories Github, Bitbucket
Online repositories that hold code, configuration and other technical
files, potentially containing credentials, API keys or sensitive code
not intended for distribution exposed by employees, contractors or
suppliers.
Technical Forums Stackoverflow,
administrator.de
Forums for discussing technical topics and questions, again
potentially containing extracts of code or sensitive technical details.
File Hosting and
Sharing Sites
Slideplayer, Megaupload Sites dedicated to sharing a wide variety of files from documents and
spreadsheets through to database backup files and data dumps.
Cloud Storage Services AWS S3 buckets
Hosted storage services with individual data stores often assumed to
be secured through obscurity containing anything from inadvertently
posted sensitive documents to caches of breaches data.
Messaging Platforms IRC, Telegram
Services used by groups and individuals to chat on themes ranging
from threat campaigns, tactics and technique, to technical topics to
the entirely benign.
Criminal Forums and
Marketplaces
Dream Market, Antichat.ru
We have focused, automated custom collection on high value
criminal forums and marketplaces on the dark and deep web where
we identify a wide variety of activity from discussion of 0-days and
exploit kits to the sale of breached data.
Tor and I2P Proprietary spiders crawl Tor and I2P, identifying new content and
sources of value.
Social Media Profiles and
Groups
Facebook Profiles and Pages,
Twitter Users, YouTube Profiles
Accounts on social networks representing individuals and groups,
sometimes used by threat groups to gain support by other
malicious actors to spoof or defame brands or individuals.
Key ExamplesSource Category Description
Digital Shadows monitors the broadest range of sources across the open, deep and dark web. We are constantly
expanding the range of sources that we cover as the threat landscape grows and changes. A number of our collection
methods use crawling or spidering techniques that are continuously identifying new domains online. In addition, our
analysts use various data analytics techniques to identify high value sources and sites as they emerge.
Job Networking Sites LinkedIn, Xing
Specialist social networks aimed at professionals on which
employees, contractors and suppliers can share, or overshare,
information about their role and experience as well as provide a
platform for potential social engineering of employees and clients.
Digital Shadows Provides Digital Risk Coverage Across
the Widest Range of Data Sources
U.S. Headquarters
Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
Dallas, TX 75206
UK Headquarters
Digital Shadows, Ltd.
Level 39
One Canada Square
London E14 5AB
Available under
Non Disclosure Agreement
www.digitalshadows.com
Glassdoor
3. Digital Risk Coverage Across the Widest Range of Data Sources continued
www.digitalshadows.com
U.S. Headquarters
Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
Dallas, TX 75206
UK Headquarters
Digital Shadows, Ltd.
Level 39
One Canada Square
London E14 5AB
News Sites BBC, CNN, Aljazeera
Mainstream news services that publish breaking news and
analysis, regularly relevant in the security sphere.
Threat Actor Blogs and
Mouthpiece Sites
Shadow Brokers steemit
feed
Sites used by threat actors to advertise, document or promote
their cause, plans and general activities.
Security Research Blogs
and Social Media
Krebs on Security, Malware
don’t need Coffee
Feeds from industry experts who regularly post on their research
and analysis providing insight on specific threats as well and
trends and patterns.
Digital Risk Coverage Across the Widest Range of
Data Sources continued
Social Media Posts
Posts on social networks from a huge range of individuals and
groups, ranging from individuals to organizations to threat actors
and groups.
Tweets, Facebook posts
Internet Connected
Devices
Insecure NAS Drives,
Insecure Home Routers
Misconfigured open internet connected devices that may
accidentally be leaking personal or corporate data.
Mobile App Stores
Google Play, Apple App store,
Baidu App Store, F-Droid Store,
App China Store
Official and unofficial mobile app stores hosting a wide range of
mobile apps for free and paid download.
Exploit and Vulnerabilities
Libraries
Available under
Non Disclosure Agreement
Sources of vulnerabilities and real-world exploits that we can
correlate with your assets and infrastructure.
Search engines that crawl and index internet connected devices
and services that we can use, amongst other things, to identify
your infrastructure that is exposed online.
Available under
Non Disclosure Agreement
Infrastructure Search
Engines
WHOIS and DNS
Information
Available under
Non Disclosure Agreement
Technical information on domains and IP addresses online,
including full WHOIS for domains and IPs, used to enrich other
sources and to identify potential phishing or malicious domains.
FTP Servers Internet-facing File Transfer Protocol (FTP) services connected
to the internet either deliberately or unintentionally without
appropriate authentication in place, broadcasting a range of files
and documents.
Key ExamplesSource Category Description
Available under
Non Disclosure Agreement
4. Why Digital Shadows
U.S. Headquarters
Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
UK Headquarters
Digital Shadows, Ltd.
Level 39
One Canada Square
Our comprehensive coverage across the open, deep and dark
web is tailored to your requirements and ensures that your
digital footprint is monitored against ever-evolving threat actors
and that you act rapidly as new and emerging threats appear.
True Visibility Of Your Risk Profile
Ever Expanding Coverage Provides Proactive Intelligence
Digital Shadows is constantly expanding it’s data sources across the
open, deep and dark web so that you can focus limited resources on
other strategic priorities. We have the expertise needed for dark web
reconnaissance, something that is challenging for IT and security
generalists to conduct successfully and anonymously.
Diverse Data Sources Strengthen Our Threat Intelligence
Our in-depth intelligence from expansive data sources is followed by
a peer review cycle from a broader team to challenge or corroborate
findings. Digital Shadows uses structured analytical techniques in
order to objectively view the threat from a variety of perspectives.
Get Started
For more information on
Digital Shadows SearchLightTM
and how we can use
comprehensive data sources to
protect your organization,
please contact us.
Visit www.digitalshadows.com
for more information
Email info@digitalshadows.com
Call us at US 1-800-889-4143
UK +44 (0)203 393 7001
Why Digital Shadows
About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data
sources within the open, deep, and dark web to protect an organization’s business,
brand, and reputation. The Digital Shadows SearchLightTM
service combines
scalable data analytics with intelligence analysts to manage and mitigate risks
of an organization’s cyber threats, data exposure, brand exposure, VIP exposure,
infrastructure exposure, physical threat, and third party risk, and create an up-to-the-
minute view of an organization’s digital risk with tailored threat intelligence.
The company is jointly headquartered in London and San Francisco.
For more information, visit www.digitalshadows.com.
What We Cover
Physical threats to your offices and
key members of staff that are
planned, discussed or publicized
online.
Weak and expiring certificates,
vulnerabilities and open ports.
Personal brand infringement
on social media and personal
information exposed by the
individual or third parties.
Exposure as a result of your
vendors and supply chain.
Sensitive documents, intellectual
property, and customer, employee
or technical information.
Indication of and evidence of attack with
threat actor, campaign and TTP profiles.
Rogue mobile applications,
phishing or malicious domains
and brand infringement on social media.
U.S. Headquarters
Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
UK Headquarters
Digital Shadows, Ltd.
Level 39
About Digital Shadows
Digital Shadows enables organizations to manage digital risk by identifying and eliminating threats to their business and brand.
We monitor for digital risk across the broadest range of data sources within the open, deep and dark web to deliver tailored threat
intelligence, context and actionable remediation options that enable security teams to be more effective and efficient. Our clients
can focus on growing their core business knowing that they are protected if their data is exposed, employees and third parties put
them at risk, or their brand is being misused. To learn more, visit www.digitalshadows.com.
U.S. Headquarters UK Headquarters
Our comprehensive coverage across the open, deep and dark
web is tailored to your requirements and ensures that your
digital footprint is monitored against ever-evolving threat actors
and that you act rapidly as new and emerging threats appear.
True Visibility Of Your Risk Profile
Ever Expanding Coverage Provides Proactive Intelligence
Digital Shadows is constantly expanding it’s data sources across the
open, deep and dark web so that you can focus limited resources on
other strategic priorities. We have the expertise needed for dark web
reconnaissance, something that is challenging for IT and security
generalists to conduct successfully and anonymously.
Diverse Data Sources Strengthen Our Threat Intelligence
Our in-depth intelligence from expansive data sources is followed by
a peer review cycle from a broader team to challenge or corroborate
findings. Digital Shadows uses structured analytical techniques in
order to objectively view the threat from a variety of perspectives.
Get Started
For more information on
Digital Shadows SearchLightTM
and how we can use
comprehensive data sources to
protect your organization,
please contact us.
Visit www.digitalshadows.com
for more information
Email info@digitalshadows.com
Call us at US 1-800-889-4143
UK +44 (0)203 393 7001
Why Digital Shadows
About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data
sources within the open, deep, and dark web to protect an organization’s business,
brand, and reputation. The Digital Shadows SearchLightTM
service combines
scalable data analytics with intelligence analysts to manage and mitigate risks
of an organization’s cyber threats, data exposure, brand exposure, VIP exposure,
infrastructure exposure, physical threat, and third party risk, and create an up-to-the-
minute view of an organization’s digital risk with tailored threat intelligence.
The company is jointly headquartered in London and San Francisco.
For more information, visit www.digitalshadows.com.
What We Cover
Physical threats to your offices and
key members of staff that are
planned, discussed or publicized
online.
Weak and expiring certificates,
vulnerabilities and open ports.
Personal brand infringement
on social media and personal
information exposed by the
individual or third parties.
Exposure as a result of your
vendors and supply chain.
Sensitive documents, intellectual
property, and customer, employee
or technical information.
Indication of and evidence of attack with
threat actor, campaign and TTP profiles.
Rogue mobile applications,
phishing or malicious domains
and brand infringement on social media.
Get Started
For more information on
Digital Shadows SearchLight™ and
how we can use comprehensive
data sources to protect your organization
please contact us:
Email: info@digitalshadows.com
U.S. Headquarters
Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
UK Headquarters
Digital Shadows, Ltd.
Level 39
One Canada Square
Widest Collection of Sources
SearchLight monitors for data exposure across the widest
range of sources, within the open, deep and dark web.
No stone is left unturned.
Tailored and Targeted Collection
A register of key assets that uniquely define your organization
and your subsidiaries drives our intelligence machinery.
Why Digital Shadows Get Started
For more information on
Digital Shadows SearchLightTM
and
how we can help protect your
organization from Data Exposure,
please contact us
Visit www.digitalshadows.com
for more information
Call us at US 1-800-889-4143
UK +44 (0)203 393 7001
Email info@digitalshadows.com
Analyst
Added Context
Digital Shadows
intelligence analysts
investigate and add
context, impact and
recommended action.
Asset Registration
Organizations register
their company assets
with Digital Shadows,
including code samples,
document markings and
email footers.
Explore View
Organizations can view
the credential exposure
at a strategic level,
identifying trends over
time.
Mitigation Options
Each incident comes with a severity level and mitigation
options. We also offer Managed Takedown Service, which
provides end-to-end management for shutting down
malicious activity and offloading this time consuming task
from your team.
About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources
within the open, deep and dark web to protect an organization’s business, brand and
reputation. The Digital Shadows SearchLightTM
service combines scalable data analytics with
intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data
exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third
party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored
threat intelligence. The company is jointly headquartered in London and San Francisco.
For more information, visit www.digitalshadows.com.
Data Exposure Example
Call us at 1-888-889-4143
UK +44 (0)203 393 7001
U.S. Headquarters
Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
Dallas, TX 75206
UK Headquarters
Digital Shadows, Ltd.
Level 39
One Canada Square
London E14 5AB
Widest Collection of Sources
SearchLight monitors for data exposure across the widest
range of sources, within the open, deep and dark web.
No stone is left unturned.
Tailored and Targeted Collection
A register of key assets that uniquely define your organization
and your subsidiaries drives our intelligence machinery.
Why Digital Shadows Get Started
For more information on
Digital Shadows SearchLightTM
and
how we can help protect your
organization from Data Exposure,
please contact us
Visit www.digitalshadows.com
for more information
Call us at US 1-800-889-4143
UK +44 (0)203 393 7001
Email info@digitalshadows.com
Analyst
Added Context
Digital Shadows
intelligence analysts
investigate and add
context, impact and
recommended action.
Asset Registration
Organizations register
their company assets
with Digital Shadows,
including code samples,
document markings and
email footers.
Explore View
Organizations can view
the credential exposure
at a strategic level,
identifying trends over
time.
Mitigation Options
Each incident comes with a severity level and mitigation
options. We also offer Managed Takedown Service, which
provides end-to-end management for shutting down
malicious activity and offloading this time consuming task
from your team.
About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources
within the open, deep and dark web to protect an organization’s business, brand and
reputation. The Digital Shadows SearchLightTM
service combines scalable data analytics with
intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data
exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third
party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored
threat intelligence. The company is jointly headquartered in London and San Francisco.
For more information, visit www.digitalshadows.com.
J17
Data Exposure Example
Visit www.digitalshadows.com
for more information
U.S. Headquarters
Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
Dallas, TX 75206
UK Headquarters
Digital Shadows, Ltd.
Level 39
One Canada Square
London E14 5AB
Widest Collection of Sources
SearchLight monitors for data exposure across the widest
range of sources, within the open, deep and dark web.
No stone is left unturned.
Tailored and Targeted Collection
A register of key assets that uniquely define your organization
and your subsidiaries drives our intelligence machinery.
Why Digital Shadows Get Started
For more information on
Digital Shadows SearchLightTM
and
how we can help protect your
organization from Data Exposure,
please contact us
Visit www.digitalshadows.com
for more information
Call us at US 1-800-889-4143
UK +44 (0)203 393 7001
Email info@digitalshadows.com
Analyst
Added Context
Digital Shadows
intelligence analysts
investigate and add
context, impact and
recommended action.
Asset Registration
Organizations register
their company assets
with Digital Shadows,
including code samples,
document markings and
email footers.
Explore View
Organizations can view
the credential exposure
at a strategic level,
identifying trends over
time.
Mitigation Options
Each incident comes with a severity level and mitigation
options. We also offer Managed Takedown Service, which
provides end-to-end management for shutting down
malicious activity and offloading this time consuming task
from your team.
About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources
within the open, deep and dark web to protect an organization’s business, brand and
reputation. The Digital Shadows SearchLightTM
service combines scalable data analytics with
intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data
exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third
party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored
threat intelligence. The company is jointly headquartered in London and San Francisco.
For more information, visit www.digitalshadows.com.
J17
Data Exposure Example