top of page
Cyber Intelligence and Threat Lab.png

Cyber Intelligence and Threat Lab

Threat intelligence capabilities based on open sources, Deep Web and Dark Web, through trap systems deployed by SIA (INNCYBER Partner), collaboration in defense programs and their partner network.

IMG_Cyber Intelligence and Threat Lab.png

Detection of external threats that may affect the client:

● Phising

● Pharming

● Fraudulent mobile applications: Any application that supplants the client's official applications in both official and unofficial markets

● Stolen credit cards (Carding)

● Targeted malware

● Reputation and brand:

● Fraudulent domains

● Brand Abuse

● VIP User Monitoring / Digital Identity Tracking

Business Disruption:

● Cyberattacks or attacks by organized groups of Hackers (Activism and Hacktivism). For example, Denial of Service attacks against corporate domains;

● Theft or leakage of Information;

● Identification of stolen credentials in Command & Control panels;

● Analysis of continuous content of portals ("Watering Holes monitoring");

● Certificate monitoring;

● Port Discovery;

● Study of browsing patterns (most visited web pages = entry vector in Watering Holes attacks).


● Closure of fraudulent assets. Objective < 72 hours;

● Counter-authority;

● Analysis of suspicious emails

Early Warning:

● Notice of new technological vulnerabilities that may affect the client, which are public, based on technological inventory (CPEs);

● Information about campaigns and threats spreading over the Internet.


● Newsletter

● Cyber Threat Feed

● Cyber Intelligence Report (emerging threat and/or adhoc to the Client)

● Monthly meeting with the CISO/CIO/CEO. Contextualized vision of the threats and risks identified in the period.Situational report / State of the art (exhibition of the entity on the Internet

bottom of page