Our company is specially engaged in the development of a CTI (Cyber Threat Intelligence) solutions with ICS (Industrial Control System) focus and Industrial Honeynet Systems (IHS). In 2019, our product won the ITBusiness Awards product development grand prize. With our 100 percent proprietary solutions, we strive to provide an effective solution to emerging CTI challenges in both industrial and critical infrastructure environments.
In addition to development, we are passionate about gathering information, so we also place a great emphasis on threat hunting activities.
Our team consists mainly of talented young people, but of course there are also some of us with 15-20 years of experience in either software development or intelligence.
In our products, services and capabilities, we strive for professional efficiency in the field of CTI as widely as possible.
More Than 114,000 Patients Affected by Wilmington Surgical Associates Ransomware Attack
In October 2020, the NetWalker ransomware gang claimed responsibility for a ransomware attack on the North Carolina-based surgical center, Wilmington Surgical Associates. The gang claimed […]
140GB of Confidential Information Leaked on the Hacker Forum from the US-Based Door Parts Distributor
On a famous dark web hacker website, a 140 GB archive that purportedly belongs to Door Controls USA, a US-based door parts store, has been […]
Kaspersky lists its industrial cybersecurity threat predictions for 2021
Security company Kaspersky announced its list of industrial cybersecurity threat challenges and predictions on what can be expected from cybercriminals active in the OT/ICS sector […]
Your boss could be the number one security threat in the office
Senior management’s password practices are ‘shocking’, experts say. (Image credit: Image source: Shutterstock/Ai825) Senior management’s password practices are “shocking”, a new report from identity and […]
CERT and Cybersecurity Agencies Disclosed Denial-of-Service (DoS) Vulnerability Affecting OpenSSL
Computer emergency response teams (CERTs) and other cybersecurity organisations around the world have issued notifications and advisories about OpenSSL’s newly discovered denial-of-service (DoS) vulnerability, and […]
Complex CTI software system with ICS specifics. The essence of CTI is that before the incident occurs, we collect data on possible attackers, methodologies, directions, motivations in the most varied ways. Accordingly, the software system provides dynamic protection, not static protection.
We collect the widest possible data (darknet, clearweb) on the Internet in order to feed our complex CTI system with sufficient Intelligence (Intel) data. This constantly, dynamically expanding Data Lake allows us to search for entities in a targeted way or in forums operating on the Dark Web.
The essence of the system and the basis of its success is that it does not focus on static defense capability, but on Threat Hunting activity, i.e. attack prevention, risk-threat identification with automated information collection and classification even before the attack.
Within the system, we operate solutions such as Blackpots, Malwerlab, STIX Graph and cyber threat intelligence.
The system collects information about attacking devices, threatening locations, methods, and information needed to identify an attacker. From this data we can deduce motivations and specific directions of attack.
The system specializes in ICS, i.e. industrial controllers, with worldwide coverage based on a Blackpot system with 150+ custom-developed (proprietary) and installed industrial controllers.
CIM provides first-hand information about attacks on both general IT infrastructure and the most common ICS protocols through its proprietary honeynet system.
Addition to this, we perform various types of information gathering on a daily basis, both manually and automatically, using a specialized methodology. We create specific databases (data lake), we use AI-driven algorithms in both data collection and data processing analysis. We also carry out SOCMINT activities.
The essence of the service is that we can monitor and search for entities on both the clear web and the dark web, either in static sources or in dynamic daily collected sources.
We can make our data collection and development capabilities and experience available to state bodies with special needs and authorization in order to enhance or entirely carry out their effective law enforcement activities.
Our simple, profitable and flexible partner program will help you grow your business by providing solutions that are easy to demo, easy to sell, and easy to manage. Our dedicated channel team is always there for you. You’ll be able to offer unparalleled customer support and satisfaction. And you’ll benefit from our aggressively competitive discounts and deal registration, joint lead generation programs, and first-class training and certification programs.