top of page

Threat Intelligence

Cyber Intelligence

DESCRIPTION:

Detection and monitoring of data leakage and exposure of sensitive information (data leak) related to "CLIENTE" available on the Clear Web (forums, IRC, Pastebin, etc.), Dark Web (Onion/Tor), or Deep Web. Monitoring of campaigns, cybercriminals, or threat actor groups (hackers, hacktivists, etc.) involving "CLIENTE" across the clear, deep, and dark web. Intelligence on advanced cybersecurity threats relevant to the organization’s region (Mexico and LATAM). Intelligence on global advanced cybersecurity threats for "CLIENTE"’s sector and industry. Identification of discrediting campaigns or reputational impact related to cyber threats or cybersecurity incidents involving "CLIENTE". This information may include motives, objectives, Indicators of Compromise (IOCs), as well as the Tactics, Techniques, and Procedures (TTPs) used by these threat actors. Identification of "CLIENTE" application source code available on the Internet. Continuous reputation monitoring of Internet-facing websites (covering critical systems, up to 20 URLs, across up to 3 domains). Reputation monitoring of critical assets exposed to the Internet.

DELIVERABLES:

Executive summary (Executive presentation):
• Methodology used
• Summary of findings


Technical report (Findings and recommendations):
• Methodology used
• Findings details
• Recommendations

CODE

CIA

BUSINESS LINE

Cibersecurity

CATEGORY

Cyber Intelligence

RESPONSIBLE:

Eduardo Salmerón

METHODOLOGY:

N/A

SCOPE:

1 Threat Intelligence request

EXECUTION TIME

Volumetry:
• 1 request – 10 business days


© 2035 Hecho en Silent 4 Business

bottom of page