We assess current cyberthreats for your business through monitoring of open and restricted sources where we gather information on prospective cyberattacks, data leakages, black PR, etc.
We conduct data gathering in three steps:
- Analysis of network perimeter and assessment of possible cyberthreats. We use passive and semi-passive techniques that look like regular network activity and include requests to open-source web services (WHOIS, DNS), public websites and search engines. We also use purpose-specific services (Shodan) which perform regular scans of web resources.
- Analysis of malware activity and cyberattacks. We employ special tools for monitoring and tracking of malware activity, actions of cybercriminals and cyberespionage operations.
- Analysis of data leakages and cybercriminal activity. It includes search for compromised accounts and data from restricted communities of cybercriminals. In private forums, we look for information on any bargains connected to your resources, clients and employees.
With the description of current threats and possible attack surface, you can effectively counter even the most dangerous cyberthreats.