Our company is specially engaged in the development of a CTI (Cyber Threat Intelligence) solutions with ICS (Industrial Control System) focus and Industrial Honeynet Systems (IHS). In 2019, our product won the ITBusiness Awards product development grand prize. With our 100 percent proprietary solutions, we strive to provide an effective solution to emerging CTI challenges in both industrial and critical infrastructure environments.
In addition to development, we are passionate about gathering information, so we also place a great emphasis on threat hunting activities.
Our team consists mainly of talented young people, but of course there are also some of us with 15-20 years of experience in either software development or intelligence.
In our products, services and capabilities, we strive for professional efficiency in the field of CTI as widely as possible.
Travel Industry Giants Failed to Secure their Websites Despite High-Profile Data Breaches, New Research Shows
Major airlines and hotel chains have failed to secure their online platforms even after previous data breaches and cyberattacks exposed information of millions of customers’ […]
Cyber losses are increasing in frequency and severity
Cyber attacks have increased in number and severity since the onset of the pandemic. The changes organizations implemented to facilitate remote work have given cybercriminals […]
CEOs are being impersonated in massive email scams
More than 7,000 CEOs were impersonated since Covid-19 kicked off. (Image credit: Image Credit: Gustavo Frazao / Shutterstock) Business email compromise (BEC) attacks, a form […]
Cyber Threat solutions provider Cygilant hit by NetWalker Ransomware Attack
Cygilant, a Cybersecurity company that offers threat monitoring solutions, was hit by a NetWalker Ransomware attack. Although the ransomware variant hasn’t been confirmed […]
Complex CTI software system with ICS specifics. The essence of CTI is that before the incident occurs, we collect data on possible attackers, methodologies, directions, motivations in the most varied ways. Accordingly, the software system provides dynamic protection, not static protection.
We collect the widest possible data (darknet, clearweb) on the Internet in order to feed our complex CTI system with sufficient Intelligence (Intel) data. This constantly, dynamically expanding Data Lake allows us to search for entities in a targeted way or in forums operating on the Dark Web.
The essence of the system and the basis of its success is that it does not focus on static defense capability, but on Threat Hunting activity, i.e. attack prevention, risk-threat identification with automated information collection and classification even before the attack.
Within the system, we operate solutions such as Blackpots, Malwerlab, STIX Graph and cyber threat intelligence.
The system collects information about attacking devices, threatening locations, methods, and information needed to identify an attacker. From this data we can deduce motivations and specific directions of attack.
The system specializes in ICS, i.e. industrial controllers, with worldwide coverage based on a Blackpot system with 150+ custom-developed (proprietary) and installed industrial controllers.
CIM provides first-hand information about attacks on both general IT infrastructure and the most common ICS protocols through its proprietary honeynet system.
Addition to this, we perform various types of information gathering on a daily basis, both manually and automatically, using a specialized methodology. We create specific databases (data lake), we use AI-driven algorithms in both data collection and data processing analysis. We also carry out SOCMINT activities.
The essence of the service is that we can monitor and search for entities on both the clear web and the dark web, either in static sources or in dynamic daily collected sources.
We can make our data collection and development capabilities and experience available to state bodies with special needs and authorization in order to enhance or entirely carry out their effective law enforcement activities.
Our simple, profitable and flexible partner program will help you grow your business by providing solutions that are easy to demo, easy to sell, and easy to manage. Our dedicated channel team is always there for you. You’ll be able to offer unparalleled customer support and satisfaction. And you’ll benefit from our aggressively competitive discounts and deal registration, joint lead generation programs, and first-class training and certification programs.