New Threat Research: MalSync Teardown: From DLL Hijacking to PHP Malware for Windows  

Read Threat Research

Search

How Does Counterintelligence Work?

Monitoring for physical, cyber, and public image threats

Threat Information Engine

  • A custom-programmed system that scrapes both Darknet and Clearnet
  • Searches for client and industry mentions on social media

Operations Team

  • Works closely with clients to avert catastrophic damage with negligible loss of time and revenue
  • Continuous monitoring until threat changes

Indications & Warnings Team

  • Monitoring both Clearnet and Darknet
  • VIP ID monitoring and protection

Research Team

  • Investigates new threats entering the global landscape
  • Researches new exploits, ransomware, and malicious code