DARK WEB MONITORING
We are now introducing Dark Web Monitoring.
Our packages are below.
Our Dark Web Monitoring Packages
Core Package — Essential Coverage
Covers up to 15 assets.
Designed for: Small businesses and start-ups needing foundational protection.
Premium Package — Enhanced Visibility
Covers up to 30 assets.
Designed for: Growing businesses or mid-sized organisations seeking greater coverage.
Enterprise Package — Comprehensive Threat Monitoring
Covers up to 100 assets.
Designed for: Enterprises, regulated industries, or those with a high-risk exposure profile.
Core Package — Essential Coverage
Covers up to 15 assets
Designed for: Small businesses and start-ups needing foundational protection.
Features:
- Leaked Credential Monitoring –Identifies usernames, emails, and passwords associated with your organisation that appear in known breaches, credential dumps, or on criminal marketplaces.
Purpose: Enables early intervention to prevent account takeovers or internal compromise.
- Stealer Log Detection –Monitors for credentials, browser data, and session cookies harvested by malware (e.g., Raccoon, RedLine) and circulated through dark web channels.
Purpose: Alerts you to compromise even in the absence of a formal data breach, allowing you to contain insider or endpoint threats.
This entry-level package is designed to give smaller businesses a dependable early warning system for compromised credentials. It provides immediate insight into known exposure across criminal forums and marketplaces, helping you take decisive action before issues escalate.
Enterprise Package — Comprehensive Threat Monitoring
Covers up to 100 assets
- Ransomware Leaks – Monitors known ransomware group leak sites for mentions of your organisation or documents.
- Infected Devices – Identifies listings of infected endpoints (including employee machines) on malware marketplaces or botnet logs.
- Financial Data Exposure – Detects exposure of financial statements, account details, or transaction data linked to your company.
- Source Code Exposure – Flags publicly posted code or repositories referencing your organisation, often found on GitHub or forums.
- Misconfigured Buckets – Identifies exposed cloud storage (e.g., AWS S3, Azure Blob) containing company or client data.
- Botnet Monitoring – Tracks botnet command-and-control telemetry for connections involving your IP ranges or devices.
- Docker Hub Monitoring – Monitors for impersonated or malicious Docker images containing your brand or code references.
- Ransomware File Detection – Locates files (e.g., contracts, customer data, internal reports) dumped by ransomware groups.
- PII and Unverified Leaks – Detects early-stage leaks containing names, addresses, or identifiers tied to your organisation.
- SEC Filings and Miscellaneous Files – Monitors exposure of sensitive documents, including regulatory filings or legal paperwork.
Optional Add-ons
Enhance any of our packages with bespoke capabilities:
