resources.digitalshadows.com
Open in
urlscan Pro
52.60.165.183
Public Scan
Submitted URL: https://mailer.digitalshadows.com/NDU3LVhFWS02NzEAAAGBCXc-txz49ZWdQ4GAMu_PhyxVqB4TvSGuo87NHxhkbJGLGs_mDe2t1uLGMcq3k1vlTQbjUgk=
Effective URL: https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/weekly-godaddy-breach-mosesstaff-political-attacks-and-co...
Submission: On November 29 via api from SE — Scanned from DE
Effective URL: https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/weekly-godaddy-breach-mosesstaff-political-attacks-and-co...
Submission: On November 29 via api from SE — Scanned from DE
Form analysis
1 forms found in the DOM<form>
<div class="cta-button-container cta-activate-button-container">
<div class="cta-field-section email-field">
<span class="cta-field-name" style="color:#161623;">Email</span>
<input type="text" class="activate-button" data-cta-id="97927">
</div>
</div>
<div class="form-fields" data-form-is-active="0">
<div class="cta-field-section
email-field ">
<span class="cta-field-name" data-field-id="128942" style="color:#161623;"> Email </span>
<input type="text" data-regex="^[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,}$" data-mapping="email" data-field-id="128942" data-required="1" class="preview-form-field" placeholder="Required" data-cta-id="97927">
</div>
<div class="cta-field-section
">
<span class="cta-field-name" data-field-id="128945" style="color:#161623;"> First Name </span>
<input type="text" data-regex="^.+$" data-mapping="firstName" data-field-id="128945" data-required="1" class="preview-form-field" placeholder="Required" data-cta-id="97927">
</div>
<div class="cta-field-section
">
<span class="cta-field-name" data-field-id="128948" style="color:#161623;"> Last Name </span>
<input type="text" data-regex="^.+$" data-mapping="lastName" data-field-id="128948" data-required="1" class="preview-form-field" placeholder="Required" data-cta-id="97927">
</div>
<div class="cta-field-section
">
<span class="cta-field-name" data-field-id="128951" style="color:#161623;"> Company </span>
<input type="text" data-regex="^.+$" data-mapping="company" data-field-id="128951" data-required="1" class="preview-form-field" placeholder="Required" data-cta-id="97927">
</div>
<div class="cta-field-section
">
<span class="cta-field-name" data-field-id="128954" style="color:#161623;"> Country </span>
<select data-regex="^.+$" data-mapping="country" data-field-id="128954" data-required="1" class="preview-form-field loaded" data-cta-id="97927">
<option>Please wait...</option>
</select>
</div>
<div class="cta-field-section
">
<span class="cta-field-name" data-field-id="128957" style="color:#161623;"> State<span class="cta-field-name-optional">- optional</span> </span>
<select data-regex="^.+$" data-mapping="state" data-field-id="128957" data-required="0" class="preview-form-field loaded" data-cta-id="97927">
<option>Please wait...</option>
</select>
</div>
<div class="cta-field-section
">
<span class="cta-field-name" data-field-id="128960" style="color:#161623;"> Job Title </span>
<input type="text" data-regex="^.+$" data-mapping="title" data-field-id="128960" data-required="1" class="preview-form-field" placeholder="Required" data-cta-id="97927">
</div>
<div class="cta-button-container">
<input type="submit" value="Sign Up" class="cta-button cta-submit-form accent-button" data-cta-id="97927" style="color:#ffffff;background-color:#3e3e5f">
</div>
</div>
</form>
Text Content
DS * Platform SearchLight Advisory Services Custom Intelligence Services * Solutions BRAND PROTECTION * Online Brand Protection * Typosquatting Protection * Social Media Monitoring DATA EXPOSURE * Data Breach Detection * Technical Leakage Detection * Intellectual Property Protection * Third Party Risk CYBER THREAT INTELLIGENCE * Cyber Threat Intel * Dark Web Monitoring * Vulnerability Intelligence * Resources Blog Resources Center Weekly Intelligence Summary Whitepapers & Reports ShadowTalk Podcast * Partner Partner Program MSSP VAR Technology Partnerships * Contact * Login * Request Demo * Try For Free Digital Shadows THREAT INTELLIGENCE AND DIGITAL RISK PROTECTION RESOURCES * Home * Blog * Use Case * Use Case * Dark Web Monitoring * Threat Intelligence * Online Brand Protection * Typosquatting Protection * Technical Leakage Detection * Third Party Risk * Data Breach Detection * Social Media Monitoring * Vulnerability Intelligence * Content Type * Content Type * Solutions Guides * Webinars * Datasheets * ShadowTalk Podcast * Videos * Research Reports * Infographics * Integrations * Customer Stories * Intelligence * Intelligence * Weekly Intelligence Summary * ShadowTalk Podcast * Research Reports * Photon Research Blogs * Industry * Industry * Financial Services * Retail * Technology * Healthcare & Pharma * Legal Services * Insurance * Language * Language * DE * FR * ES * JP * IT × * Share this Post * Facebook * Twitter * Email * LinkedIn Home » ShadowTalk - Threat Intelligence Podcast by Digital Shadows » Weekly: GoDaddy Breach, MosesStaff Political Attacks, and Conti Orchestrates Emotet Comeback × Share this Post * Facebook * Twitter * Email * LinkedIn WEEKLY: GODADDY BREACH, MOSESSTAFF POLITICAL ATTACKS, AND CONTI ORCHESTRATES EMOTET COMEBACK Digital Shadows ShadowTalk Threat Intelligence Podcast · Weekly: GoDaddy Breach, MosesStaff Political Attacks, and Conti Orchestrates Emotet Comeback ShadowTalk host Chris alongside Rory, Dylan and Xue, bring you the latest in threat intelligence. This episode they cover: * Emotet botnet comeback orchestrated by Conti ransomware gang * GoDaddy Breach * MosesStaff conducting politically motivated attacks Check out the latest Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-26th-nov ***Resources from this week’s podcast*** Black Friday: Is there a threat actor in. Your shopping cart? https://www.digitalshadows.com/blog-and-research/black-friday-is-there-a-threat-actor-in-your-shopping-cart/ The Patching Nightmare https://www.digitalshadows.com/blog-and-research/the-patching-nightmare/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes. No Previous Posts NEXT POST Weekly: Exploit-as-a-Service, Emotet’s Return, and FBI Fake Email Campaign On this episode of ShadowTalk, the team covers Vulnerability Intelligence: Exploit-as-a-Service, Emotet’s r... × Threat Intel Fan? Sign up below to get our TI updates delivered to your inbox! Email Email First Name Last Name Company Country Please wait... State- optional Please wait... Job Title Thank you! Error - something went wrong! MOST RECENT ARTICLES * ‹ * › Podcast Weekly: Exploit-as-a-Service, Emotet’s Return, and FBI Fake Email Campaign ON THIS EPISODE OF SHADOWTALK, THE TEAM COVERS VULNERABILITY INTELLIGENCE: EXPLOIT-AS-A-SERVICE, EMOTET’S RETURN AND A FBI FAKE EMAILS CAMPAIGN. Listen Here Podcast Special: NCSAM Takeaways and Key Resources FOR THIS SPECIAL EDITION OF SHADOWTALK, HOST CHRIS ALONGSIDE KIM AND XUE ARE COVERING THE KEY TAKEAWAYS FROM THIS YEAR’S NCSAM AND SHARE SEVERAL BEST-PRACTICE PIECES RELEASED THROUGHOUT THE MONTH. Listen Here Podcast Weekly: Robinhood data leak, NSO in US Appeals Court and Iranian-linked hackers target ISPs THIS WEEK'S EPISODE OF SHADOWTALK COVERS THE ROBINHOOD DATA LEAK, THE NSO IN US APPEALS COURT AND IRANIAN-LINKED HACKERS THAT TARGET ISPS. Listen Here Podcast Weekly: NRA under the gun, Groove hoax, and Conti gulf apology THIS EPISODE OF SHADOWTALK'S TOPICS INCLUDE: GRIEF GETS NRA UNDER THE GUN, IS GROOVE A HOAX? AND CONTI APOLOGIZES TO THE GULF; FBI WARNS AGAINST INSIDE DATA USED TO TARGET VICTIMS. Listen Here Podcast Weekly: NOBELIUM is back, Ransomware Decryptors and Employers, and Spooky Halloween Tales THIS WEEK ON SHADOWTALK COVERS: NOBELIUM TARGETS GLOBAL IT SUPPLY CHAIN AGAIN AND A TALE OF RANSOMWARE EMPLOYERS AND DECRYPTORS. Listen Here Podcast Weekly: REvil Rep Death, Ransomware Trends, and BlackMatter Advisory THIS EPISODE OF SHADOWTALK COVERS A REVIL REP DEATH, Q3 RANSOMWARE TRENDS, AND THE BLACKMATTER CISA ADVISORY. Listen Here Podcast Weekly: FIN12 Targets Healthcare, Google Phishing, and Pentagon Official Resigns THIS EPISODE THEY COVERS: FIN12 TARGETS HEALTHCARE SECTOR, GOOGLE TARGETED BY APT PHISHING CAMPAIGN, AND A US OFFICIAL RESIGN OVER US-CHINESE AI & CYBERSECURITY DIFFERENCE. Listen Here Podcast Weekly: Twitch Hack, Facebook blackout, and Pandora Papers THIS SHADOWTALK COVERS THE TWITCH HACK, FACEBOOK TAKES A DAY OFF, RANSOMWARE ROUNDUP - REVELATIONS FROM REVIL, LOCKBIT, AND CONTI, AND THE PANDORA PAPERS RELEASE. Listen Here Podcast Weekly: NOBELIUM Malware, BEC scheme, and EU Condemns Russian Cyberactivity THIS EPISODE COVERS NEWLY DETECTED NOBELIUM MALWARE CREATES PERSISTENT BACKDOOR, FOUR INDIVIDUALS CHARGED WITH WIDE-RANGING BEC SCHEME, AND THE EU CONDEMNS RUSSIAN CYBER ACTIVITY AHEAD OF ELECTIONS. Listen Here Podcast Weekly: FBI under fire, Microsoft goes passwordless, and RaidForums THIS WEEK THE SHADOWTALK TEAM DISCUSSES: THE FBI UNDER FIRE ABOUT DECRYPTION KEYS, MICROSOFT GOES PASSWORDLESS AND RAIDFORUMS LEFT RESTRICTED AREA OPEN. Listen Here Podcast Special: Dr. Tom Robinson - Threats to Crypto and Tracking Ransomware with Blockchain Analytics SHADOWTALK HOSTS SEAN NIKKEL AND CISO, RICK HOLLAND SIT DOWN WITH DR. TOM ROBINSON, CHIEF SCIENTIST AND CO-FOUNDER OF ELLIPTIC. THEY TALK TRACKING RANSOMWARE WITH BLOCKCHAIN ANALYTICS. Listen Here Podcast Weekly: Mozi arrest, Fortinet credentials, and Splunk PowerShell Release SHADOWTALK HOSTS SEAN, RICK, IVAN, AND AUSTIN BRING YOU THE LATEST IN THREAT INTELLIGENCE. THIS WEEK THEY COVER THE MOZI ARREST, FORTINET CREDENTIALS, AND SPLUNK POWERSHELL RELEASE. Listen Here Podcast Weekly: ProxyToken and Lockfile, AlphaBay’s Comeback SHADOWTALK HOSTS STEFANO, CHRIS, KIM, AND ADAM BRING YOU THE LATEST IN THREAT INTELLIGENCE. THIS WEEK THEY COVER PROXYTOKEN AND LOCKFILE AS WELL AS ALPHABAY’S COMEBACK. Listen Here Podcast Weekly: #tbt Throwback Thursday Edition SHADOWTALK HOSTS SEAN, IVAN, ALEC, AND RICK HOLLAND BRING YOU THE LATEST IN THREAT INTELLIGENCE. THIS WEEK THEY COVER BOTNETS, SHINYHUNTERS, AND HACKTIVISTS. Listen Here Podcast Weekly: Prometheus, Ransomware Updates, and Microsoft Morse Code THIS WEEK'S EPISODE OF SHADOWTALK COVERS PROMETHEUS TDS, SEVERAL RANSOMWARE UPDATES WE COULDN'T STAY AWAY FROM, AND THE MICROSOFT ATTACK THAT USED MORSE CODE. Listen Here Podcast Weekly: Phishing Site Targets Scammers, China Pulls False Flag in Israel, $600 Million Crypto Hack SHADOWTALK HOSTS SEAN, IVAN, CHARLES, AND CISO RICK HOLLAND BRING YOU THE LATEST IN THREAT INTELLIGENCE. Listen Here Podcast Weekly: Wiper Malware Targets Olympics, MeteorExpress Attack, PwnedPiper, Hopper and More! SHADOWTALK HOSTS ADAM, DYLAN AND KIM BRING YOU THE LATEST IN THREAT INTELLIGENCE. Listen Here Podcast Weekly: CISA guidelines, Q2 Ransomware roundup, and PunkSpider’s back! SHADOWTALK HOSTS SEAN, ALEC, RICK, AND IVAN BRING YOU THE LATEST IN THREAT INTELLIGENCE. THEY COVER CISA GUIDELINES ON FREQUENTLY EXPLOITED VULNERABILITIES , Q2 RANSOMWARE AND PUNKSPIDER. Listen Here Podcast Weekly: Microsoft Exchange attribution, NSO Spyware, Zero-days, and Clippy SHADOWTALK HOSTS STEFANO, SAUL, RORY, AND KIM COVER MICROSOFT EXCHANGE ATTRIBUTION, NSO SPYWARE, ZERO-DAYS, AND CLIPPY. Listen Here Podcast Weekly: Kaseya, REvil Goes Dark, and PrintNightmare Update THIS WEEK COVERS: KASEYA ANNOUNCES PATCHES HAVE BEEN PUSHED TO VSA SAAS PLATFORM, REVIL GOING DARK, AND AN UPDATE TO THE PRINTNIGHTMARE SITUATION. Listen Here Return to Home © Digital Shadows × Streams * Home * Blog * Use Case * Dark Web Monitoring * Threat Intelligence * Online Brand Protection * Typosquatting Protection * Technical Leakage Detection * Third Party Risk * Data Breach Detection * Social Media Monitoring * Vulnerability Intelligence * Content Type * Solutions Guides * Webinars * Datasheets * ShadowTalk Podcast * Videos * Research Reports * Infographics * Integrations * Customer Stories * Intelligence * Weekly Intelligence Summary * ShadowTalk Podcast * Research Reports * Photon Research Blogs * Industry * Financial Services * Retail * Technology * Healthcare & Pharma * Legal Services * Insurance * Language * DE * FR * ES * JP * IT * Share this Hub * Facebook * Twitter * Email * LinkedIn × DIGITAL SHADOWS * Home * Searchlight * Try Searchlight Now * Customer Stories * Contact Us * Private Policy SOLUTIONS * Brand Protection * Typosquatting Protection * Social Media Monitoring * Data Breach Detection * Intellectual Property Protection * Third Party Risk * Cyber Threat Intelligence * Dark Web Monitoring * Vulnerability Intelligence COMPANY * About Us * Management Team * Careers * Events * Press * Partners RESOURCES * Practical Guide to Digital Risk * Blog * Resources Center * Intelligence Summary * Research Reports * Shadowtalk Podcast * * * * * Copyright © 2019 Digital Shadows Ltd, All rights reserved. Digital Shadows, the Digital Shadows Logo are trademarks and registered trademarks of Digital Shadows Ltd. Digital Shadows Ltd is a company registered in England and Wales under No: 7637356. Registered office: 7 Westferry Circus, Columbus Building Level 6, London, E14 4HD.