You want to build a Platform? ..What Platform Should I use?

You want to build a Platform? ..What Platform Should I use?

By Daniel Clemens | Aug 9, 2020 12:00:00 AM

The echo’s of investors had started the buzz of the need for new investigative / intelligence platforms a great deal more than there had been in the past few years. The buzz will only gain more...

PR: Italy’s Soft Strategy & ShadowDragon Partner providing Investigative training & advanced investigative capabilities.

PR: Italy’s Soft Strategy & ShadowDragon Partner providing Investigative training & advanced investigative capabilities.

By Daniel Clemens / Jun 22, 2020 12:00:00 AM

SoftStrategy and ShadowDragon Partnership Rome, Italy JUNE 22, 2020 – SoftStrategy and ShadowDragon partner together to provide advanced investigative training. As the world has become...

Training, methodology, and not dying in a ball of twisted metal

Training, methodology, and not dying in a ball of twisted metal

By Elliott Anderson / Jun 3, 2020 12:00:00 AM

Here at ShadowDragon, since 2008 we have been building world class OSINT tools and cyber security products.  From SocialNet to OIMonitor to Malnet, we’ve put together solutions for solving...

Into the Dark Webs

Into the Dark Webs

By Brooks M / May 27, 2020 12:00:00 AM

## What is the DarkWeb The dark web sounds scary, but in reality, it is anything you cannot get to via Google, or that uses a masked IP address. The classification of the dark web is a...

Where does operational security begin?

Where does operational security begin?

By Elliott Anderson / May 20, 2020 12:00:00 AM

Over the course of the last few months, we’ve blogged about finding bad guys by guessing emails, mapping friends, understanding emotional behavior, and leveraging laziness and poor password...

Rate Limits in Data Visualization

Rate Limits in Data Visualization

By Josh C / May 13, 2020 12:00:00 AM

One of the most frustrating things to happen in any data visualization software is for you to run a query and get back the notification: “This result returns more nodes than you are allowed to...

Becoming Dark Web Rambo

Becoming Dark Web Rambo

By Elliott Anderson / May 6, 2020 12:00:00 AM

There’s a lot of mystery that surrounds the dark web–surprisingly, even in the information security space.  I’ve met a huge swath of capable engineers and developers who can explain the technical...

Cutting your teeth on ShadowDragon’s advanced CTF

By Elliott Anderson / Apr 29, 2020 12:00:00 AM

We’ve talked in recent weeks about the importance of training and the methodology behind it.  Much of the OSINT work we do is focused on the social aspects and footprint of a target online.  As most...

Hacking in the Middle East

Hacking in the Middle East

By Josh C / Apr 24, 2020 12:00:00 AM

In the past, we have looked into a hacker who comes from Iran by the name of Mrb3hz4d. Now if we take some of the information we saw from his defacement, we can create an extremely simple...

Additional Insights into Iranian Cyber Espionage | APT33

Additional Insights into Iranian Cyber Espionage | APT33

By Daniel Clemens / Apr 24, 2020 12:00:00 AM

Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage”detailing the targets within the Aerospace and Energy sectors being targeted. To compliment...

Scroll to Top