SoftStrategynSD

PR: Italy’s Soft Strategy & ShadowDragon Partner providing Investigative training & advanced investigative capabilities.

By Daniel Clemens | June 22, 2020

Rome, Italy JUNE 22, 2020 – SoftStrategy and ShadowDragon partner together to provide advanced investigative training. As the world has become more sophisticated, many businesses have needed to adapt to…

SoftStrategynSD

PR: Italy’s Soft Strategy & ShadowDragon Partner providing Investigative training & advanced investigative capabilities.

By Daniel Clemens / June 22, 2020

Rome, Italy JUNE 22, 2020 – SoftStrategy and ShadowDragon partner together to provide advanced investigative training. As the world has become more sophisticated, many businesses have needed to adapt to…

4 training fundamentals2

Training, methodology, and not dying in a ball of twisted metal

By Elliott Anderson / June 3, 2020

Here at ShadowDragon, since 2008 we have been building world class OSINT tools and cyber security products.  From SocialNet to OIMonitor to Malnet, we’ve put together solutions for solving problems,…

into the darkwebs1

Into the Dark Webs

By Brooks M / May 27, 2020

## What is the DarkWeb The dark web sounds scary, but in reality, it is anything you cannot get to via Google, or that uses a masked IP address. The…

where does operational security

Where does operational security begin?

By Elliott Anderson / May 20, 2020

Over the course of the last few months, we’ve blogged about finding bad guys by guessing emails, mapping friends, understanding emotional behavior, and leveraging laziness and poor password habits.  All…

too many nodes1

Rate Limits in Data Visualization

By Josh C / May 13, 2020

One of the most frustrating things to happen in any data visualization software is for you to run a query and get back the notification: “This result returns more nodes…

darkweb rambo6

Becoming Dark Web Rambo

By Elliott Anderson / May 6, 2020

There’s a lot of mystery that surrounds the dark web–surprisingly, even in the information security space.  I’ve met a huge swath of capable engineers and developers who can explain the…

shadowdragon share

Cutting your teeth on ShadowDragon’s advanced CTF

By Elliott Anderson / April 29, 2020

We’ve talked in recent weeks about the importance of training and the methodology behind it.  Much of the OSINT work we do is focused on the social aspects and footprint…

APT33 CircleOfTruth

Additional Insights into Iranian Cyber Espionage | APT33

By Daniel Clemens / April 24, 2020

Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage” detailing the targets within the Aerospace and Energy sectors being targeted. To compliment their post we…

shadowdragon share

Hacking in the Middle East

By Josh C / April 24, 2020

In the past, we have looked into a hacker who comes from Iran by the name of Mrb3hz4d. Now if we take some of the information we saw from his…

data vs intelligence1

Data vs. Intelligence

By Josh C / April 22, 2020

It would take about 3 minutes to teach someone how to collect data on a single individual. That is easy to do. You poke around and find out all you…

Fishing with a Subaru

Fishing with a Subaru

By Elliott Anderson / April 15, 2020

There comes a time in some OSINT investigations where we have accurately identified our target’s profiles, lifestyle, and communication platforms, but we still aren’t quite to the point of pinpointing…

demystifying the darkweb3 1

Demystifying the Dark Web: Part 3

By Josh C / April 1, 2020

After looking at the structure of both the dark web and normal web, we can now start to see why so many people want the benefits Tor gives, especially the…

Scroll to Top