Cyberthint

Cyberthint is an unified cyber threat intelligence platform that allows you to take precautions against cyber threats that may affect your company and employees in cyberspace.

LEARN MORE

 

HOW DOEST IT WORK?

 

Our automated robots and cyber intelligence analysts that are working for each service mentioned below perform in-depth research for you with knowledge of your assets identified in the Cyberthint system (domains/subdomains, URL, IP addresses, e-mail addresses, keywords) on the platforms which are such as WWW, deep/dark web, social media, chat groups, forum sites, mailing lists; for you.

The findings obtained as a result of the research are passed through the verification stage by our system and then notifications(alarms) with detailed results belong our customers are sent to the (specific/private) user panel and e-mail addresses.

 

MODULES/FEATURES

 

Threat Intelligence

 

IP addresses and web sites which are acting as C2, performing various attacks, hosting/distributing malware, are presented to you instantly. As an extra, cyber threat database against to your country.

 

Vulnerability Scanning

 

Performing Network, Web Application and SSL systems specific vulnerability scans monthly on a regular basis.

 

 

 

 

Passive Vulnerability Scanning

 

Vulnerability tracking according to the name and version information of the software/products used in the organization, sharing the latest vulnerabilities, as well as 0-day research studies are carried out by our experts on the software and products which are in use by you.

 

Dark Web/Leaked DB Tracking

 

Our robots and experts working 24X7 on the Deep/Dark Web, which is the dark side of the Internet, frequently perform detailed inspections and perform intelligence researches related with organization. An also, detection of data leakages belonging to your company is determined from our current database and sources that fed from different up-to-date locations.

 

Open Source Intelligence

 

The digital attack surface of the institution is detected by OSINT (Whois query, DNS records, sub domain discovery, e-mail address detection, port scanning, search engine records, etc.) methods.

 

Advanced Phishing Detection

 

The website and IP addresses used for phishing attacks that specifically target your organization are detected. While the attackers are still in preparation phase, addresses that are opened for malicious purpose detection is ensured.

 

Brand Protection

 

It is the detection and notification of the web pages opened, registered similar domain names and fraudulent social media accounts to imitate/threaten the brands owned by the organization before being used for any threatening purpose in an action.

 

Malware Analysis and Intelligence

 

A malware analysis and intelligence service for suspected file, hash, IP and URL addresses.

 

 

 

Stolen Credit Cards Searching

 

Following-up and instant notification process of credit card informations that belongs to your employees or corporate customers are obtained from all kinds of platforms which are somethings' up.

 

Blacklist Control

 

Continuous blacklist checking operation for your IP addresses and domain names broadcasting on the Internet.

 

Malicious Web Content Control

 

Frequently inspecting and analyzing of threat contents on the corporate web page(s).

 

Accesibility/Service Monitoring

 

Accessibility/service monitoring can be performed continuously and instantaneously on the assets broadcasting on the internet with HTTP, HTTPS, Ping and IP:Port methods.

 

Mail Address Reputation Checker

 

"Is this email risky?" & "Is this a reliable sender?" questions are answered by using factors such as; domain name age, traffic rank, presence on social media sites, presence on professional networking sites, deliverability, data breaches, phishing emails, threatening emails, and more. Thus, the reputation of your corporate e-mail addresses is measured.

 

Fake Application Tracking

 

Detection of fake applications published in mobile markets for imitation purposes other than the official applications of the organization.

 

Social Media Analysis

 

It is the reporting of situations that will bring cyber risk to the institution through social media sites.

 

Cyber Daily

Daily notifications are made about the cyber security agenda in the world.

 

Findings and User Management

 

You can create an event for each finding detected by the Cyberthint and manage the findings by assigning jobs between your team members.

 

API Sharing

 

API sharing can be provided to our customers for each service of Cyberthint. Thus, integration with other security products (SIEM etc.) can be done easily.

 

Expert Audit

 

Besides Cyberthint's automated services, our experts also conduct in-depth research for your organization.

 

Solution Support

 

Cyberthint, offers detailed solution proposals for the needs of your organization regarding detections in addition to sharing cyber threats.