THE MOST COMPREHENSIVE SOURCE FOR THREAT INDICATORS
We use a network of software based crawlers that process data 24/7 from paste sites, underground marketplaces, IRC, onion sites, P2P and other sources. Additionally we have Russian, French, German and English speaking analysts who operate undercover in the darknet. Our team has discovered many exclusive leaks in the past that have been recognized by global press.
Accessing the dark web and finding various data leaks is relatively easy. The more difficult part of the task is narrowing down the search to find meaningful and actionable threat data that a client can use to truly improve the security posture. The threat information in Kaduu can be provided as raw data or contextual data. Kaduu uses state-of-the-art self-learning ML algorithms to identify correlations between different data sets and give the administrator a risk indicator. The data can be made available via a web-based user interface, a REST API or also as an export in various formats (XML, CSV).
In certain areas, such as the Domains, Forums & Leaks, we archive historical data. New leaks are added regularly, but it is safe to assume that there is a considerable amount of time between the publication of the leak on the darknet and the appearance of the vulnerability. Hot leaks are often first abused by the criminals themselves before they are offered. In other areas, however, we offer a live search. For example, paste and git sites are visited hourly, but it can take up to 12 hours for all data to be indexed. Onion sites are live only and provide insight in a period of about 12 hours. Older entries on Onion sites are not cached. In the social media space, we present data within a timeframe of a few hours.
To make the most of the service, the customer should be alerted when new and relevant information emerges. At the beginning, the monitoring service is accompanied by an onboarding. We find the optimal search terms through manual queries and evaluations, which are later transferred to the automated alerting (e.g. via E-Mail).
KADUU IS DIFFERENT: WE CONNECT THE DOTS!
The whole of the information generated by artificial intelligence is greater than the sum of the individual pieces of information added together. We connect the dots!
Cyber Threat Intelligence made for swiss banks. Priced for MSSP.