Managed Detection & Response
Always On – we ensure our customers’ resilience, 24x7x365
Read moreCyber Threat Intelligence
Word-class data, analysis and insights on threat actors and the evolving threat landscape.
Threat Insights Threat Intelligence Feeds Threat Monitors Cyber Defence FeedEmergency Response Retainers
Get a fast response from world-class experts and rapidly reinstate business continuity.
Read moreConsulting
Highly specialized services to identify and remediate complex risks and threats.
AD Health Check Compromise Assessment Emergency Response Penetration TestingWhat’s New?
Emergency Response
Read moreManaged Detection and Response (MDR)
Read moreBrand Protection
Anti-PhishingCyber Threat Intelligence
Threat Insights Threat Intelligence Feeds Threat Monitors Cyber Defence FeedCyber Threat Intelligence
Threat MonitorsManaged Detection and Response (MDR)
Read moreEmergency Response Retainers
Read moreConsulting
Emergency ResponseManaged Detection and Response (MDR)
Read moreCyber Threat Intelligence (CTI)
Threat MonitorsEmergency Response
Read moreManaged Detection and Response (MDR)
Read moreBrand Protection
Anti-PhishingCyber Threat Intelligence
Threat Insights Threat Intelligence Feeds Threat Monitors Cyber Defence FeedCyber Threat Intelligence
Threat MonitorsManaged Detection and Response (MDR)
Read moreEmergency Response Retainers
Read moreConsulting
Emergency ResponseManaged Detection and Response (MDR)
Read moreCyber Threat Intelligence (CTI)
Threat MonitorsFrom: 21 March 2022
To: 20 April 2023
Threat Intelligence Portal
“Internal reference” field has been added to tickets. It allows users to store references to other ticketing systems related to the case and is displayed in the notification email's title.
The Ticket UI/UX has been improved by always displaying the ticket comment overlays.
The inactivity period for automatically closing tickets has been reduced from 60 to 30 days.
A new "My tickets" quick-filtering link has been added to enable users to perform quick searches for tickets in which they are participating.
Anti-Phishing
Started ingestion of data from additional sources.
Improved redirection following when crawling URL shorteners.
Refined the presentation of the network and capture details for Phishing URLs.
Cyber Threat Intelligence
Stay informed.
Get our Cyber Bytes!