Dashboard example

Our Services

We create action-able, near-real time threat and intelligence products, which allow you to protect your company assets and customer data in a fast, reliable way.

Our services monitors over 90 actor-maintained ransomware and data leak sites. Intelligence analysts enrich actor data with geo- and sector-specific data points, attributing a cyber event to an entity anywhere in the world.

Integrate our data feeds into your existing cyber-solutions and respond to cyber-attacks against your customers, peers or third-parties and protect your information.

NEW Browse our leaksite screenshot gallery!

Activity

Last Seven Days

Events

In the past 7 days we have observed 172 new events across 32 countries and attributed them to 35 threat actors.

Geolocation & Sectors

The top targeted country was United States and the most targeted sector was Law Practice.

Threat Actors

The threat actor/malware LeakedData has been busy with 38 new events (22%) in this period!


During the last 24 hours, our service also has ...

Events

🔎

Manually enriched 23 events

Data Leaks

💧

Observed 23 data leak(s)

Screenshots

📸

Created 48 new screenshots

Email Alerts

📧

Delivered 643 email alerts to subscribers


Product Screenshots

Take a quick peak into the dashboard and services with these screenshots.

Graph for sectors

Identify most targetted sectors and compare them over time.

Graph for dates

Gain unique insights into when organizations and their data is being published by threat actors.



Use Cases

How can your specific organization benefit from this service?
Learn how others are already using it.

DFIR companies

Get notified when your customer is being posted by an actor.

Global organizations

Identify contracted or future third-parties and suppliers and assess their security posture.

ISACs and ISAOs

Notify your member organisations on impact to shared service providers.

Researchers

Learn about most impacted sectors, top targeted countries and much more.


Integrate the data feed into your existing solutions (like Jira tickets, Threat Intelligence Platforms/TIPs) and use it to kick-off your process to validate your business relationship with the impacted partner.
Use the available information better respond to an external event - block network access from the partner, notify your account manager or enforce contractual requirements.