Cyber Threat Intelligence
In-depth knowledge against global threats
Yarix’s Cyber Threat Intelligence Team (YCTI) is made up of specialised analysts who, thanks to particular skills and experience in the sector, help your company to interpret the information available on the web – Clear, Dark and Deep Web – to prevent and fight threats such as cyber crime, hacktivism, planned operations for theft of data or blocking company activities. They are able to move around the dark web with covert profiles, infiltrating black markets and forums where malware, exploits and other attack tools are distributed, and interact directly with the Threat Actors. Access to these environments often requires an introduction by one of the existing members.
Cyber Intelligence has become an ever-more important tool for identifying, managing and enhancing da ta present in the network in order to recognise actual threats.
The Cyber Threat Intelligence service is provided not just through manual search activities, but also through automated acquisition of intelligence data.
The team’s work in investigating, collecting and distributing information is supported by advanced tools and by an exclusive proprietary platform. The platform analyses large quantities of data from different channels, both open sources (OSINT) such as social media, and from sources with restricted access and underground channels (CLOSINT).
The primary purpose is to find trends in progress and the existence of threats to an organisation before these can damage it. In the event of a real threat, the team promptly sends the client a detailed analysis report and proceeds with actions to tackle it.
In the current landscape, Cyber Threat Intelligence represents a key element of Cyber Security and, thanks to the proactive approach, is the element which makes the difference in fighting cyber security threats.
From Credit Card Monitoring through to VIP Protection, innovative solutions to complete the proactive protection of your corporate assets.
Service to identify and recover credit/debit cards from underground/cyber crime channels, phishing sites and other intelligence sources, both manually and via the proprietary CTI platform.
Service to find and identify malicious mobile applications and/or those similar in terms of graphics, logos and functionality to official client applications but not officially authorised.
Sharing via standard platforms of valid, high-quality indicators of compromise (IoC) with a focus on Italy and Europe, derived from internal intelligence, monitoring (SOC), incident response (IR) activities and high-value partnerships (FIRST).
Continuous monitoring service for users with particular media exposure (CEO, Executives, C-Level) to identify threats individually targeted at them, such as exposure of credentials or personal information, vectors or potential campaigns of phishing, spear-phishing, identity theft, and other cyber crime activities.