Cluster25 Advanced Threat Research team continually probes the Clear, Deep and Dark web to capture new indicators of compromise, emerging threats, relevant adversaries, evolving tactics and targeted campaigns. The gathered insights provide real-time alerts, proactive response, and tailored reports that help secure the infrastructure and assets of our customers, from IGOs to SMBs.
DuskRise’s curated threat intelligence, powered by OSINT, CLOSINT and HUMINT, integrates seamlessly with downstream security controls to actively block ransomware, phishing and other malicious attacks. Our cutting-edge platform helps reduce downtime, data loss, reputational damage, false positives, MttD and MttR.
A unique solution to protect organizations from security threats and vulnerabilities. It includes two areas: Intelligence and Feed.
Intelligence provides information on threats and vulnerabilities. Feeds provide a real-time view of emerging threats and "Early Warning" services.
The Hunting and Investigate section of the Cluster25 Platform offers a range of investigation and analysis services for malware detection.
Services include retrohunting with YARA rules, automated behavioral analysis (sandbox), gene analysis, and custom analysis services for suspicious artifacts.
Cluster25's Exposure Intelligence offers a comprehensive monitoring solution for protecting one's assets from external threats.
Composed of four areas: Surface Intelligence, Risk/Identity Intelligence, domain Squatting and Takedown Service, and VIP Monitoring Service.
DuskRise offers tailored services such as Platform on Premise and Cyber Surveillance. Platform on Premise provides dedicated infrastructure with three instances sized according to customer needs.
Cyber Surveillance service monitors the digital perimeter, detecting botnet and high-level malware infections, leakage of sensitive information and external credentials with access to corporate resources.
Discover the latest reports and white papers from the Cluster25 team.
Cluster25 observed a malicious campaign that employs LinkedIn messages as a vector for executing identity theft attacks....
Cluster25 observed and analyzed several phishing-based attacks to be linked to a Russia-nexus nation-State threat actor....
Become a part of the top-class cyber threat intelligence unit to make humans and organizations more secure.