Threat Intelligence

We assess current cyberthreats for your business through monitoring of open and restricted sources where we gather information on prospective cyberattacks, data leakages, black PR, etc.

We conduct data gathering in three steps:

  1. Analysis of network perimeter and assessment of possible cyberthreats. We use passive and semi-passive techniques that look like regular network activity and include requests to open-source web services (WHOIS, DNS), public websites and search engines. We also use purpose-specific services (Shodan) which perform regular scans of web resources.
  2.  Analysis of malware activity and cyberattacks. We employ special tools for monitoring and tracking of malware activity, actions of cybercriminals and cyberespionage operations.
  3. Analysis of data leakages and cybercriminal activity. It includes search for compromised accounts and data from restricted communities of cybercriminals. In private forums, we look for information on any bargains connected to your resources, clients and employees. 

Results

With the description of current threats and possible attack surface, you can effectively counter even the most dangerous cyberthreats. 


Order

Reasonable and appropriate measures are taken to ensure that your personal data is protected from unauthorized access or modification, unlawful destruction, and improper use. No information provided by you will be made available to third parties. Personal data will be held only for as long as is necessary for the purpose for which it is provided and, in any event, will only be kept for 24 months after any application you have made has been completed. By submitting your personal information, you consent to the use of your information as set out in this statement.