bio
We offer an intelligence service to companies by proactively monitoring and reporting activity that concerns our clients. We turn all intelligence into an informational product that is delivered to the client.
We gather intelligence through the following methods:
Technical cyber feeds including botnets, attack sources, malware, trends
Observation and monitoring of underground hacking groups/chat rooms
Monitoring information on the Dark/Deep Web
Activity monitoring on social media concerning client’s interests
Intentional and unintentional client information disclosure online
Information gathering on groups/individual posing a potential risk