Our company is specially engaged in the development of a CTI (Cyber Threat Intelligence) solutions with ICS (Industrial Control System) focus and Industrial Honeynet Systems (IHS). In 2019, our product won the ITBusiness Awards product development grand prize. With our 100 percent proprietary solutions, we strive to provide an effective solution to emerging CTI challenges in both industrial and critical infrastructure environments.
In addition to development, we are passionate about gathering information, so we also place a great emphasis on threat hunting activities.
Our team consists mainly of talented young people, but of course there are also some of us with 15-20 years of experience in either software development or intelligence.
In our products, services and capabilities, we strive for professional efficiency in the field of CTI as widely as possible.
Divisive political climate stirs up hacktivist activity, and businesses are not immune
Pictured: Anti-mask protesters clash with Black Lives Matter counter-protesters in Columbus, Ohio last July. (Megan Jelinger/SOPA Images/LightRocket via Getty Images) As the 2020 presidential election […]
Feds Propose ‘911’ Emergency Call for Reporting Security Flaws; Experts Warn It’s Easier Said Than Done
CISA drafts directive to create a vulnerability disclosure policy for government websites and apps Agency seeks to centralize the effort via a standard vulnerability disclosure […]
Hidden Cobra APT Hackers Attack Japanese Organisations Via Obfuscation Malware & Remote SMB Tool
Recently, the hidden cobra APT threat actors attacked Japanese organizations through obfuscation malware. This malware downloads and administers all the modules, and then it’s saved […]
Travel Industry Giants Failed to Secure their Websites Despite High-Profile Data Breaches, New Research Shows
Major airlines and hotel chains have failed to secure their online platforms even after previous data breaches and cyberattacks exposed information of millions of customers’ […]
Complex CTI software system with ICS specifics. The essence of CTI is that before the incident occurs, we collect data on possible attackers, methodologies, directions, motivations in the most varied ways. Accordingly, the software system provides dynamic protection, not static protection.
We collect the widest possible data (darknet, clearweb) on the Internet in order to feed our complex CTI system with sufficient Intelligence (Intel) data. This constantly, dynamically expanding Data Lake allows us to search for entities in a targeted way or in forums operating on the Dark Web.
The essence of the system and the basis of its success is that it does not focus on static defense capability, but on Threat Hunting activity, i.e. attack prevention, risk-threat identification with automated information collection and classification even before the attack.
Within the system, we operate solutions such as Blackpots, Malwerlab, STIX Graph and cyber threat intelligence.
The system collects information about attacking devices, threatening locations, methods, and information needed to identify an attacker. From this data we can deduce motivations and specific directions of attack.
The system specializes in ICS, i.e. industrial controllers, with worldwide coverage based on a Blackpot system with 150+ custom-developed (proprietary) and installed industrial controllers.
CIM provides first-hand information about attacks on both general IT infrastructure and the most common ICS protocols through its proprietary honeynet system.
Addition to this, we perform various types of information gathering on a daily basis, both manually and automatically, using a specialized methodology. We create specific databases (data lake), we use AI-driven algorithms in both data collection and data processing analysis. We also carry out SOCMINT activities.
The essence of the service is that we can monitor and search for entities on both the clear web and the dark web, either in static sources or in dynamic daily collected sources.
We can make our data collection and development capabilities and experience available to state bodies with special needs and authorization in order to enhance or entirely carry out their effective law enforcement activities.
Our simple, profitable and flexible partner program will help you grow your business by providing solutions that are easy to demo, easy to sell, and easy to manage. Our dedicated channel team is always there for you. You’ll be able to offer unparalleled customer support and satisfaction. And you’ll benefit from our aggressively competitive discounts and deal registration, joint lead generation programs, and first-class training and certification programs.