Home » Threat Intelligence
by admin

U.S.T.A. by PRODAFT: Monitoring Deep, Dark, and Clear Web to Uncover Evolving Digital Threats

The U.S.T.A. platform by PRODAFT keeps a watchful eye on various facets and domains of deep-web, dark-web, and clear-web platforms, in order to gain a more comprehensive understanding of these ever-evolving environments.

TACTICAL INTELLIGENCE

T – Custom threat reports (featuring incidents or trends that affect the receiving U.S.T.A. member, its industry, or region)

USTA analysts will create customized Strategic Intelligence reports for each client, sector and country, according to newly emerging cyber-trends. Additionally, USTA will also create custom strategic intelligence reports according to request of each USTA user


SECURITY INTELLIGENCE

SI.1 – Custom Malware Analysis Reports

PRODAFT will provide detailed analysis reports and notifications involving latest malware types / trends related to the user’s Client, country or sector. Additionally, the user will be able to request analysis of a malware sample / malicious link

SI.2 – U.S.T.A. Leak Database

Prodaft will provide a “Leak Database”; which provides access to large scale database leaks that have occurred in the past. This Leak Database will be open to USTA user’s usage on a 24/7 basis, enabling the user to search for any relevant data leaks resulting from third parties

SI.3 – Vulnerability Notifications

Under the scope of USTA’s vulnerability notifications module, PRODAFT will issue alerts and warnings about most recently discovered vulnerabilities which may be used against USTA user, due to a vendor, tool or product currently used in the organization.

SI.4 – Stolen Corporate Credential Notifications (botnet intelligence)

USTA provides details about most-recently discovered stolen corporate web-panel credentials. Unlike USTA’s Leak Database Module, stolen corporate credentials module notifies the user about credentials which are not resulted from third-parties, but stolen from their respective owners by means of mobile / desktop stealer malware variants.

 

BRAND PROTECTION

BP.1 – Phishing Site Detection and Takedown
USTA Threat Intel Platform will be able to detect brand violations of the user and notify the user in case of a new detection. In case subjected violation is related to an ongoing cyber-attack or cyber fraud campaign, USTA operators will initiate necessary takedown procedures accordingly.

BP.2 – Suspicious/Malicious Social Media Content Detection and Takedown
Under the scope of USTA Threat Intel Service, all social media brands of the user will be constantly monitored against the risk of impersonation and violation. PRODAFT will automatically initialize required takedown procedures for detected impersonation cases.

BP.3 Fake Mobile Apps
Under the scope of USTA Cyber Threat Intelligence service, all mobile application markets (both official and unofficial) are continuously monitored against emergence of a fake mobile application which may be targeting customers of USTA-member organizations. When a fake mobile application is detected; a notification is sent to the organization.


FRAUD INTELLIGENCE

FI.1 – Stolen Credit Card Notifications (banking only)

USTA will be crawling the cyber underground for the purpose of tracking down stolen credit cards, issued by USTA-member banking institutions. Upon detection of a stolen credit card, USTA will automatically forward its findings in desired ticket / API format in less than 60 seconds.

FI.2 – Stolen ID and Passport Feeds

FI.3 – Fraud Method Notification

The user will be able to access “Fraud Trend” reports of PRODAFT, which are authored by USTA analysts. Additionally, the user will also be able to request creation of such reports involving a specific threat

FI.4 – Stolen Customer Credential Notifications

USTA provides details about most-recently discovered stolen corporate web-panel credentials. Unlike USTA’s Leak Database Module, stolen corporate credentials module notifies the user about credentials which are not resulted from third-parties, but stolen from their respective owners by means of mobile / desktop stealer malware variants.

Tailored Cybersecurity with Global Expertise. 

MEDIA POOL

Videos

Blog

Podcasts

QUICK LINKS

Our Services

 

©2024 Cubic Consulting, a Smart Security Company for your Business – All Rights Reserved.
The domains cubic.consulting, cubic-consulting.com, and cubic-lighthouse.com are owned and managed by Cubic Consulting SARL