Blog - ShadowDragon

Blog

Link analysis with OSINT, breach data, and intelligence in one comprehensive investigations toolkit

By ShadowDragon | April 14, 2024

In a landscape where information is power, the ability to gather, analyze, and act upon open-source intelligence (OSINT) is paramount for organizations across all sectors. Recognizing this need, we have made some significant advancements to our OSINT Platform, Horizon®. Unlock a modern approach to link analysis with OSINT, breach data, and intelligence together in one […]

Featured Tracking GozNym Campaigns with MalNet

Tracking GozNym Campaigns with MalNet

By Daniel Clemens / April 22, 2016

In 2007, Don Jackson while at SecureWorks had written about the Gozi Trojan, sharing details on the modularization and monetization strategies utilized by this family of malware. More recently, (04/04/16) […]

Featured Demonstration Tracking Malware Campaigns and Domains Using MalNet v2

Demonstration: Tracking Malware Campaigns and Domains Using MalNet

By Daniel Clemens / April 15, 2016

MalNet brings together the industry’s most up to date and extensive threat information from Proofpoint with Maltego link analysis capabilities from ShadowDragon. MalNet enables threat analysts and researchers to identify […]

New Blog Entry

ShadowDragon Announces Partnership with Proofpoint

By Daniel Clemens / March 8, 2016

Cheyenne, Wyoming – March 8, 2016 ShadowDragon, a U.S.-based cyber threat intelligence solutions company, has entered into a partnership with Proofpoint, a leading next-generation cybersecurity company, to develop ShadowDragon MalNet. […]

New Blog Entry

Packet Ninjas Formally Announces the Formation of ShadowDragon

By Daniel Clemens / February 16, 2016

Cheyenne, Wyoming – February 16, 2016 Packet Ninjas, a niche cyber security consulting and services company, today announced the formation of a sister company named ShadowDragon. ShadowDragon will license specialized […]

New Blog Entry

The Cyber Crime Chronicles: Your Friendly Neighborhood Hacker

By Daniel Clemens / November 28, 2015

Just a couple of weeks ago the world was rocked by the news that CIA Director John Brennan’s AOL email account (apparently that’s still a thing) had been hacked. Immediately, […]

New Blog Entry

The Cybercrime Chronicles: Understanding The Actors

By Daniel Clemens / November 27, 2015

Cyber Threat Types and Motivations There are several types of cyberwars going on at any given time. There are plain old hacking attacks, criminally-targeted attacks, nation state cyberwar, and hacktivist […]

New Blog Entry

Why OSINT?

By Daniel Clemens / November 26, 2015

Ordinary Info to You; Opportunity to a Cyber Criminal As its name suggests, OSINT is intelligence gleaned from publicly available sources such as social media, company websites, news sites, even […]

Scroll to Top