In the fourth episode of season 2 of the ShadowDragon podcast, CEO Daniel Clemens, CTO Elliott Anderson, and Director of Intelligence and Innovation Collection Nico Dekens (aka Dutch OSINT Guy) sat...
Now a few weeks removed and recovered from the chaos of the RSA Conference, I wanted to share my thoughts on the 2023 event (the bad and the good). As we look ahead to the rest of the year, the event...
In the third episode of season 2 of the ShadowDragon podcast, CEO Daniel Clemens and Director of Intelligence and Innovation Collection (aka Dutch OSINT Guy) Nico Dekens sat down for a one-on-one...
In a recentopinion piece for The Cipher Brief, Gregory Sims, former CIA Clandestine Service for over thirty years, including multiple field tours as Chief and Deputy Chief of CIA stations, shared his...
Daniel Clemens, Founder & CEO, ShadowDragon Is climate change the cause of higher energy prices? Likely not. That being said, there is common confusion surrounding energy policy and basic economics....
In the second episode of season 2 of the ShadowDragon podcast, CEO Daniel Clemens, CTO Elliott Anderson, and Director of Intelligence and Innovation Collection (aka Dutch OSINT Guy) Nico Dekens sat...
After six weeks of investigation, on Dec. 30, 2022 authorities arrested Bryan Kohberger as the key suspect in the quadruple murders of four University of Idaho students. This case (which is ongoing)...
Season 2 of the ShadowDragon podcast is here! In the first episode, CEO Daniel Clemens and CTO Elliott Anderson were joined by the Dutch OSINT guy, Nico Dekens.
The echo’s of investors had started the buzz of the need for new investigative / intelligence platforms a great deal more than there had been in the past few years. The buzz will only gain more...
SoftStrategy and ShadowDragon Partnership Rome, Italy JUNE 22, 2020 – SoftStrategy and ShadowDragon partner together to provide advanced investigative training. As the world has become more...
Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage”detailing the targets within the Aerospace and Energy sectors being targeted. To compliment...
2020 will be eventful and likely one of the most historical years containing change, balancing the tension between change, conflict, and hopefully peace in a long time. When reflecting on the...
On September 11th, 2012, US embassies had been hit with attacks known as the “Benghazi Attacks.” In online correlation, attacks that had been referenced as “Operation Ababil” had begun as a supposed...
Additional information is always needed on initial indicators for a SOC analyst or incident handler. In this case, initial indicators point to [ clear. co. ir and 79.127.125.179 ] engaging in...
ShadowDragon is a privately-held software development company seeking a full-time training and curriculum specialist. ShadowDragon provides cyber security software tools to commercial entities,...
In my last entitled Illuminating Context with Timeline Analysis, I gave a rough sketch of the basics. In this post I will share a few specifics. The primary point to drive home is there won’t ever...
In our training courses, we push ideas and investigative methodology more than we push our tools. Tools will change, but proper investigative methods will not change. Asking the right questions will...
Redwood City, California – May 16, 2019 DataWalk and ShadowDragon have formed a strategic technical alliance to facilitate more complete and detailed investigations incorporating open source...
Every investigation is different, but what never changes is how you have to treat an investigation much like the challenge of building something with a bucket of Legos. With each bread crumb, you...
Catching the backscatter of conversation, keywords and data dumps have always been one of the driving goals in our OIMonitor project. While others have been quick to highlight one particular...
Shadow Dragon has created an automated document conversion tool that expands analysts’ capabilities, speeds analysis and investigations, and making the electronic transmission of files between...
I had previously written about how we started with our our monitoring platform and how that grew into the beast it is today. I didn’t leave much room to frame things in the most hip-infosec way,...
DEF CON 26, Intel CTF (iCTF) had more participants than any other capture the flag challenge. With over 100 teams showing up, a select few escalated to the top of the heap showing off their skills,...
This was my second year attending the Crimes Against Children Conference (CACC) in Dallas. CACC draws a crowd proficient in the art of finding the bad guys and protecting the defenseless, and I...
If the world has a plethora of investigators and the success of prosecutors is hovering around 90% success rate — why do we struggle with an increase in more complex crime, a rise in international...
Millions love the character Jack Ryan from Tom Clancy’s bestselling 18-book series (and a new TV show on Amazon!), but not as many folks know that there is a real, live Jack Ryan living in America...
Cheyenne, Wyoming and Denver, Colorado With more than 3.1 billion people across the globe actively using Social Media, it is no surprise that criminals utilize it and can be tracked down on it by...
In “Understanding Link Analysis and Using it Investigations,” I detailed how to get started and some fundamentals on link analysis. What I didn’t cover was how long you should be involved in the...
ShadowDragon is proud to be a co-sponsor of the Mission III Advanced iCTF Contest at Defcon 2018. iCTF has crafted a compelling and challenging scenario! Participating is a great way to hone your...
BANGALORE, India ALTEN Calsoft Labs, a next-generation digital transformation company, rolls out a plan to Prevent Cyber Attacks and Minimize Damage by leveraging ShadowDragon’s cyber intelligence...
I started using link analysis for investigations somewhere around 2009/2010 when we were developing the first version of SocialNet. A longtime friend, Roelof from Paterva, shared his vision for a...
Yesterday, Matthew Meltzer, Sean Koessel, and Steven Adair @ Volexity released an excellent write-up on the Indian APT group known as Dropping Elephant. The Volexity article detailed attacks against...
ShadowDragon, a U.S.-based cyber threat intelligence solutions company, has enhanced its OIMonitor product to include secure and customizable monitoring of forums, open, closed source, TOR and...
When most security pros think of threat intelligence, they think of cyber crime – tracking down hackers and cyber criminals aiming to compromise networks to exploit credit card information,...
Attack methods targeting businesses nearly doubled from 82,000 in 2016 to at least 159,700 in 2017 (the majority of cyberattacks are never reported), according to the Online Trust Alliance. 2017 was...
United States – ShadowDragon, a U.S.-based cyber threat intelligence solutions company, today announced that its SocialNet App is the first Social Media Forensics & OSINT mapping app available on...
The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why the Clear Sky report...
ShadowDragon: Solving the Challenges of Modern Investigations Today, the internet is ubiquitous. It has revolutionized businesses and communications. It also has revolutionized crime....
Cheyenne, Wyoming – ShadowDragon, a U.S.-based cyber threat intelligence solutions company, has entered into a distribution agreement with GuidePoint Security LLC, a Virginia-based technology...
It was the end of 2010. The Packet Ninjas’ team (the predecessor of ShadowDragon) had been making mad dashes on application assessments and penetration tests while deployed to a nowhere...
Cheyenne, Wyoming – ShadowDragon makes it to the list of 20 Most Promising Enterprise Security Solution Providers 2017 by CIOReview. CIOReview is a technology magazine with a mission to guide...
Votiro Labs and ClearSky CyberSecurity both based out of Israel, through use of MalNet have uncovered a slew of interesting TTPs and infrastructure believed to be used by the 1937CN group. Votiro &...
Accelerating Law Enforcement Capabilities DeliverFund’s iHTAC is a unique collaboration with corporate partners who bring innovative technology tools used to accelerate law enforcement capabilities...
In one case, I found myself in a country in Latin America investigating a complicated persistent business compromise being implemented through both electronic and human means. I had already been...
Cheyenne, Wyoming – December 15, 2016 ShadowDragon, a company that develops specialized digital investigations technology, and DeliverFund, a nonprofit dedicated to disrupting sex trafficking...
The buzz of cyber compromise has been booming since the AP released some interesting points on the Hillary Clinton email compromise. This was followed up by Brian Krebs on May 16th, 2016 noting less...
Perhaps the most nefarious, these attackers are driven almost exclusively by financial gain. These criminals typically target personal and corporate systems, and range in skill from Nigerian 419...
MalNet accesses the Proofpoint ET Intelligence™ comprehensive database that contains current and historical malicious IP addresses and domains. In this blog post we share screenshots of Maltego 4...
Below are a few screenshots of our flagship product SocialNet, integrated with the new Maltego M4 release. If you haven’t seen the video from Maltego, please go check it out now. Email Correlations
Our first artifact, begins with the email address rumored to be used by Jesse Pinkman, pivoting on one to one correlations between his favorite social media provider and others, we find his wish...
In 2007, Don Jackson while at SecureWorks had written about the Gozi Trojan, sharing details on the modularization and monetization strategies utilized by this family of malware. More recently,...
MalNet brings together the industry’s most up to date and extensive threat information from Proofpoint with Maltego link analysis capabilities from ShadowDragon. MalNet enables threat analysts and...
Cheyenne, Wyoming – March 8, 2016 ShadowDragon, a U.S.-based cyber threat intelligence solutions company, has entered into a partnership with Proofpoint, a leading next-generation cybersecurity...
Cheyenne, Wyoming – February 16, 2016 Packet Ninjas, a niche cyber security consulting and services company, today announced the formation of a sister company named ShadowDragon. ShadowDragon will...
Just a couple of weeks ago the world was rocked by the news that CIA Director John Brennan’s AOL email account (apparently that’s still a thing) had been hacked. Immediately, speculation began. Had...
Cyber Threat Types and Motivations There are several types of cyberwars going on at any given time. There are plain old hacking attacks, criminally-targeted attacks, nation state cyberwar, and...
Ordinary Info to You; Opportunity to a Cyber Criminal As its name suggests, OSINT is intelligence gleaned from publicly available sources such as social media, company websites, news sites, even...