Cyber Threat Intelligence Reports

Cyber-crime and Hacktivism are posing a growing threat to different organisations worldwide. Naturally, the majority of cyber-criminal activity is conducted online. Hackers discuss methods, trends and campaigns on the social-media as well as dedicated online communities. These online communities are located on hidden or secret dark websites. There is no way to capture the data without employing HUMINT (Human Intelligence methods) to infiltrate secret sites. We use Cyber-HUMINT cyber sock puppets to obtain access to specific websites of interest, using our custom-developed GoldenSpear Cyber-HUMINT.

S2T Analytics offered tailored cyber threat intelligence subscriptions that provide organisations and cyber-security professionals with concrete and actionable information. We employ a pool of analysts with wide language skills, including Chinese, Russian, Spanish, Portuguese, Arabic, Farsi, Bahasa Indonesia, Urdu, Hindi, and Tagalog. This helps us provide comprehensive coverage of the threat landscape and address any threats specific to a particular organisation. Our team of intelligence analysts work closely with our cyber-security experts to ensure the intelligence produced is indeed actionable, for example by conducting malware analysis of new malware obtained by intelligence analysts.

Serving several prominent clients worldwide in the multiple sectors, including Financial Services, Utilities, Education, and Government, S2T has a long time experience in monitoring the cyber-crime arena and pointing out crucial developments in that field. We believe that an active approach towards cyber-security is required in order to better defend against the ever-developing threats which this arena poses:

  • Collect data from numerous sources in order to draw concrete and actionable insights
  • Detect targeted threats against your organization in real-time and analyse them
  • Monitor the dark-net, deep web and online closed communities in order to trace potential breaches and threats concerning your organization

We have successfully supported our clients in anticipating DDoS attacks, Malware insertion attacks, website defacement attacks, as well as other incidents. For more examples of analytical products, refer to the Insights section.