Phishia CTI

Anticipate threats, protect your strategic assets

Phishia CTI: from detection to the neutralizationWe provide you with continuous threat intelligence to protect your critical systems and guide your cybersecurity decisions.

PhishiaCTI cluster in figures

credentials analyzed
0 k+
critical incidents reported
0 k+
monitored identifiers
0
anticipated attacks
0

Cyber threat intelligence, what is it?

Cyber threat intelligence (CTI) is intelligence about the threats you face.
We monitor and analyze what's relevant to you, then take the right action to avoid an incident or limit its impact.

Flare X Phishia, a winning combination

Flare, Phishia, our web/deep/dark sensor, detects and retrieves via targeted searches (name/company, BIN, email, phone, domain/URL, IP, login, password...), and contributes to the management of your external attack surface (EASM). Phishia qualifies, prioritizes and implements the response (resets, blocking, SIEM/EDR rules).

We therefore classify each leak encountered according to an indicator developed in-house, ranking them by priority for action:

Criticality 1

Minor

Criticality 2

Significant

Criticality 3

Major

Criticality 4

Review

CTI: anticipating attacks

Before each attack, signals appear

On the Dark Web, malicious actors trade, recruit, test tools or seek to monetize access.

This creates unusual business-related activity.
We detect and correlate these signals to trigger preventive measures, to anticipate and thwart attacks.

For example, in the attached red box :

By analyzing how often a company appears on the Dark Web, our tools identify any unusual rise in activity, indicative of a potential attack.

In the end, there was no shortage of them. After the rise from November to January, an attack did take place. With this type of surveillance, the attack would have been avoided.

Our recommendations

Incident follow-up process

DarkWeb monitoring

We continuously monitor the DW for any suspicious activity: access sales, data leaks, malware, VPNs, attack preparations, exchanges between players...

incognito (1)
OSINT

Targeted survey of the service or asset in question to assess actual exposure and concrete risk, in order to distinguish between proven threat and false-positive/noise.

search (1)
Check

Within the authorized framework, we verify the reality and scope of the threat by means of appropriate checks (e.g. testing the validity of a password).

stamp (1)
Criticality + report

Depending on the criticality established by our experts, we alert you immediately with a clear playbook, accompanied by a concise report containing all incident-related information.

file (1)

Phishia CTI offer

Included in the offer

  • Analysis of all data leaks and remediation plan
  • Testing the validity of credentials
  • Prioritizing the criticality of credentials
  • Live alternating for the most critical alerts
  • Monitoring compromised end-points
  • Detailed bi-monthly reporting

From

30/month

per ID

* unique identifier that we monitor for you (domain name, IP, personal e-mail...)

Phishia CTI Flash

Visit 15 days maximum, Our Flash CTI offer gives you a clear overview of your exposure on the dark web.

For each leak identified, you receive a remediation plan and detailed concrete recommendations to sustainably reduce your display surface and prevent it from happening again.

1.

Setting the scene

Definition of critical domain names, VIPs and portals to be monitored.

2.

ID-MDP pair testing
Check for leaks in the list of critical portals transmitted.

3.

VIP advanced search
Targeted analysis of VIP account exposure on open sources and the dark web.

4.

Remediation & security plan
Proposals for remedial action and reinforcement of portal security.

5.

Final report
Complete summary with assessment, prioritization and next steps.

Phishia CTI Flash offer

Included in the offer

  • Tests of all credentials sent by Flare
  • Plan to reinforce platform safety
  • Leak detection for X VIP
  • Support for remediation of identified leaks
  • Detailed report

What we need

Domain names
VIP list
Connection portals

Our blog

Discover the latest news and trends in SOC & CTI.

en_US