Icon for Passguards Threats module

Threats

A
n
a
l
y
s
e
 
wh
o
i
s
 
b
e
i
n
g
t
a
r
g
e
t
e
d
a
n
d
 
h
o
w
s
e
r
i
o
u
s
t
h
e
t
h
r
e
a
t
i
s
Obtaining an accurate threat assessment is a headache for many organisations. How do you know if attackers are really paying attention to your organisation and who is being targeted? We help you with a specific threat picture, all fully related to your organisation.
PASSWORDS

Cracking passwords

External services store user passwords in encrypted form. If such a dataset is leaked after a hack, the encryptions must first be cracked. Hackers do this publicly on cracking forums. We monitor whether your organisation's passwords are cracked and measure how much time hackers spend doing this.
Hacker Requests

Activities on marketplaces

On hacker marketplaces, time and talent come together. Some hackers specialise in social engineering by creating profiles of people. Others are experts in cracking rare hashes. We monitor activity and transactions on these marketplaces related to your organisation.
Hacker Targets

Target Lists

The ultimate thrill on the dark web is to hack another hacker, as proof of your skills. After such a hack, the hacker's data is leaked. We search this data to investigate whether accounts of your organisation are on internal target lists of the hacker.

Capabilities

Threat Levels

Is the threat level increasing or decreasing? We chart threat level trends over the years.

Targets

Integrated threat indicator analysis reveals which of your organisation's accounts are attracting hackers' attention.

Time Invested

Threat is abstract. Therefore, we quantify the time invested by hackers based on reverse engineering of password strength and encryption type.

Actor Analysis

Examine hacker names to establish interlinkages: who is first active on a marketplace and then posts accounts on target lists?

The Targeted Nature of Threat

How focused are attackers on your organisation? To assess this, we map the size of their target lists.

Benchmarking

Does your organization have a higher or lower threat level than others? You will get this answer through an anonymized benchmark

Retake the information-advantage

Begin the process of mapping your dark web exposure by completing this contact form today.
Contact us
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.