This is new page for language translation
Home » New Page
This is new page for language translation
Copyright Cyber.com.SA @ All Rights Reserved. 2022
Frequency of new incidents, items and asset discovery.
Legal takedown of malicious phishing websites that usurp your brand or digital identity.
24/7 access to our threat analysts to review and discuss any newly discovered intrusions, data breaches and other security incidents.
Comprehensive monitoring of fake accounts in social networks, domain cybersquatting and typosquatting that target the company’s brand or identity.
Comprehensive monitoring of ongoing phishing and online fraud campaigns targeting the company’s executives, employees or customers.
Comprehensive monitoring of various Dark Web resources for the company’s stolen credentials or documents, compromised systems or databases for sale, mentions of backdoored devices or servers belonging to or operated by the company.
Comprehensive monitoring of code, system and container repositories to detect leaked or exposed source code, system images and hardcoded secrets (e.g. API keys) belonging to the company.
Comprehensive monitoring of Indicators of Compromise (IoC), threat intelligence feeds, discussions on hacking forums, underground marketplaces, Telegram and IRC channels mentioning the company, its executives or employees, data or IT assets.
Comprehensive discovery of all network services, appliances and IoT devices accessible from the Internet that belong to or are operated by the company.
Comprehensive discovery of exposed or unprotected cloud storage, services, APIs and instances located in over 50 public cloud service providers including AWS, Azure and GCP that belong to or are operated by the company.
Comprehensive detection of vulnerable or outdated web and network software, exposed admin interfaces or consoles, insecure server configurations, weak encryption, and PCI DSS, NIST and GDPR compliance failures of all external IT assets belonging to or operated by the company.
Comprehensive discovery of publicly accessible (e.g. via website or public app stores) mobile applications of the company with full list of mobile endpoints (e.g. APIs and web services).
Comprehensive discovery of on-premise and cloud-hosted websites, web applications, APIs and web services belonging to or operated by the company.
Comprehensive discovery of domain names and subdomains belonging to or operated by the company.
24/7 access to our security analysts for misconfiguration and vulnerability remediation questions.