Cyber Threat Intelligence Services and Monitoring

What threats to your organisation's security lie in the furthest corners of the Internet and on the Dark Web?

Intelligence Services is a highly tailored service providing your organisation with intelligence gathered beyond traditional security testing. It's the ultimate in proactive protection – finding out what you don’t know!

How we can assist:

Intelligence Services combine various information gathering methods, tooling and expert knowledge to detect findings that may be advantageous to an attacker and not detected by traditional scanners and penetration testing.

Our reports are highly regarded for their business utility. They will detail your risks and provide a suggested course of action to remediate against the findings.

Our cybersecurity consultants can identify what is to be found, originating from your organisation, beyond your network borders, that could pose a threat. Investigating, for example:

  • Dark Web markets and forums,
  • Underground hacker communities
  • Social media exposed risks
  • Paste Sites
  • Internet Relay Chat channels
  • the wider Internet.

We look to see what shouldn’t be there….ie stolen data, personal information leakage, breached credentials, proprietary code etc. This can often be the first indication that you have had a breach!

We’ll partner with you to determine which of the three Intelligence Services offerings are most suitable for your needs:

Intelligence Snapshot

This is a point-in-time baseline intelligence engagement to gain an insight into publicly available information across a handful of pre-selected domains. It also includes a human component where we identify key staff, based on their roles in your organisation, and investigate their social media presence and if there is any potentially valuable information that can be used to target that individual.

Intelligence Program

This is a continuously evolving intelligence engagement delivered quarterly, driven by client feedback. It includes identification and analysis of key staff and their social media risks as in the Intelligence Snapshot service and also organisational elements, using a range of intelligence methods including OSINT, SOCMINT, HUMINT, DARKINT, GEOINT etc. This engagement can be both passive and active. The report is delivered every three months and is a point-in-time analysis.

Continuous Monitoring

Along with the Intelligence Program that provides quarterly reporting, this service includes continuous monitoring of the Dark Web. It covers threats such as new data breaches, databases for sale, confidential information leaks and new ransomware information. All positive alerts will be passed on and an initial assessment provided. Further investigation, or remediation will be at additional cost.


Dark Web Cybersecurity

In an interview with TickerTV, Tesserent CIO, Michael McKinnon, explains the significance and dangers of the dark web, and its role in data breaches and ransom attempts.


Why you need a dark web expert on your security team

Publishing data online has become a common modus operandi for cyber criminals—but will Aussie organisations even notice when it happens?

Ezgif com gif maker 5

Frequently Asked Questions

What types of threats might an Intelligence engagement uncover?

  • Compromised credentials and data breaches
  • Unintentionally exposed file directories containing sensitive information
  • Brand and VIP impersonation risks
  • Information leaks by staff, customers and third parties
  • Social media exposed risks
  • Permuted domains known to act as phishing and malware distributors or C2 hosts
  • Identification of threat actors and ATP groups that could potentially target the client
  • Credential stuffing possibilities
  • Targeted attacks
  • Software information and known exploits
Contact us

Speak with a Tesserent
Security Specialist

Tesserent is a full-service cybersecurity and secure cloud services provider, partnering with clients from all industries and all levels of government. Let’s talk.

Let's Talk
Tess head 1 min 2