Cyberthint
Cyberthint
Cyberthint is an unified cyber threat intelligence platform that allows you to take precautions against cyber threats that may affect your company and employees in cyberspace.
- Description
HOW DOEST IT WORK?
Our automated robots and cyber intelligence analysts that are working for each service mentioned below perform in-depth research for you with knowledge of your assets identified in the Cyberthint system (domains/subdomains, URL, IP addresses, e-mail addresses, keywords) on the platforms which are such as WWW, deep/dark web, social media, chat groups, forum sites, mailing lists; for you.
The findings obtained as a result of the research are passed through the verification stage by our system and then notifications(alarms) with detailed results belong our customers are sent to the (specific/private) user panel and e-mail addresses.
MODULES/FEATURES
Threat Intelligence
IP addresses and web sites which are acting as C2, performing various attacks, hosting/distributing malware, are presented to you instantly. As an extra, cyber threat database against to your country.
Vulnerability Scanning
Performing Network, Web Application and SSL systems specific vulnerability scans monthly on a regular basis.
Passive Vulnerability Scanning
Vulnerability tracking according to the name and version information of the software/products used in the organization, sharing the latest vulnerabilities, as well as 0-day research studies are carried out by our experts on the software and products which are in use by you.
Dark Web/Leaked DB Tracking
Our robots and experts working 24X7 on the Deep/Dark Web, which is the dark side of the Internet, frequently perform detailed inspections and perform intelligence researches related with organization. An also, detection of data leakages belonging to your company is determined from our current database and sources that fed from different up-to-date locations.
Open Source Intelligence
The digital attack surface of the institution is detected by OSINT (Whois query, DNS records, sub domain discovery, e-mail address detection, port scanning, search engine records, etc.) methods.
Advanced Phishing Detection
The website and IP addresses used for phishing attacks that specifically target your organization are detected. While the attackers are still in preparation phase, addresses that are opened for malicious purpose detection is ensured.
Brand Protection
It is the detection and notification of the web pages opened, registered similar domain names and fraudulent social media accounts to imitate/threaten the brands owned by the organization before being used for any threatening purpose in an action.
Malware Analysis and Intelligence
A malware analysis and intelligence service for suspected file, hash, IP and URL addresses.
Stolen Credit Cards Searching
Following-up and instant notification process of credit card informations that belongs to your employees or corporate customers are obtained from all kinds of platforms which are somethings' up.
Blacklist Control
Continuous blacklist checking operation for your IP addresses and domain names broadcasting on the Internet.
Malicious Web Content Control
Frequently inspecting and analyzing of threat contents on the corporate web page(s).
Accesibility/Service Monitoring
Accessibility/service monitoring can be performed continuously and instantaneously on the assets broadcasting on the internet with HTTP, HTTPS, Ping and IP:Port methods.
Mail Address Reputation Checker
"Is this email risky?" & "Is this a reliable sender?" questions are answered by using factors such as; domain name age, traffic rank, presence on social media sites, presence on professional networking sites, deliverability, data breaches, phishing emails, threatening emails, and more. Thus, the reputation of your corporate e-mail addresses is measured.
Fake Application Tracking
Detection of fake applications published in mobile markets for imitation purposes other than the official applications of the organization.
Social Media Analysis
It is the reporting of situations that will bring cyber risk to the institution through social media sites.
Cyber Daily
Daily notifications are made about the cyber security agenda in the world.
Findings and User Management
You can create an event for each finding detected by the Cyberthint and manage the findings by assigning jobs between your team members.
API Sharing
API sharing can be provided to our customers for each service of Cyberthint. Thus, integration with other security products (SIEM etc.) can be done easily.
Expert Audit
Besides Cyberthint's automated services, our experts also conduct in-depth research for your organization.
Solution Support
Cyberthint, offers detailed solution proposals for the needs of your organization regarding detections in addition to sharing cyber threats.