About service

Many attacker groups post publicly available information about attacks that have been carried out or are planned. In the Internet shadow segments one may find advertisements for the sale of confidential company information or illegitimate access to infrastructure. Timely receipt of such information helps to immediately initiate incident investigations or take preventive measures to minimize possible consequences.

The publication of confidential or sensitive information can lead to reputational and financial damage. It is important to monitor and prevent the dissemination of such information, detect the appearance of phishing resources that use the corporate identity and trademarks of the organization for fraudulent purposes (impersonation), as well as cybersquatting, spreading false information about the company, etc.

When working with external IT and cyber security contractors, companies may encounter unfair secrets storage: keys, passwords, tokens get into open repositories of contractors, source code fragments of implemented solutions are published.

OSINT and brand protection service includes search and analysis of information placed both in indexed and non-indexed Internet segments.

Best solution if

1

No OSINT processes in the company and additional TI sources are required

2

Cyber security risks associated with publicly available information about the company (forgotten published assets, information for targeted phishing, etc.) require reduction

3

Company brand is known in the market and attractive to attackers (impersonation, cybersquatting, spreading deliberately false information about the company)

4

Control over the absence of publicly available company secrets (keys, passwords, tokens, source code fragments, information about the platforms and services used) is required.

We offer:

Regular searches for confidential and sensitive information;

Impersonation fact-finding;

Assistance in blocking illegitimate resources;

Assistance in pre-trial or trial proceedings (compensation for material losses and brand damage);

Service available on subscription or at a time

How it works:

1

Conducting interview with the customer, defining the scope and direction of work

2

Collecting necessary information and further analysis

3

Providing a detailed report

Try it out

Let’s talk how to improve the security and efficiency of your IT and cyber security systems.