LINKS
ABOUT
SOCIAL
  • LinkedIn Social Icon

www.darkscope.com

info@darkscope.com

Tel: +64 4 889 0886

‚Äč

© 2018 Darkscope International Ltd.

Cyber Watchtower

Cyber Watchtower uses a mix of Artificial Intelligence (AI) and human expertise to identify the risks from the noise in the
The Cyber Watchtower uses an extensive network in the deep web to provide strategic intelligence on threats to organisations. It can help to uncover cyber risks and protect organisations against threats such as:  

 

  • Hacking for Hire

  • General and Specific Cyber Exploits

  • Software Vulnerabilities

  • Stolen Intellectual Property, Designs, or Trade Secrets  

  • Stolen Financial Information  

  • Stolen Personally Identifiable Information

  • Targeted Phishing and Spam Campaigns

 

Cyber Watchtower uses a mix of Artificial Intelligence (AI) and human expertise to identify the risks from the noise in the deep web. Our AI Bots use deep artificial neural networks to find information and data that is hidden to conventional techniques. We simultaneously correlate thousands of sources to find indicators for ongoing or planned attacks, as well as customer related information or data. This can be simple data records which are for sale or more complex situations where someone is looking for an exploit to target an attack or hack an organisation.  
Our AI works in groups. One group has been trained, with more than 1.6 billion records, to search for changes and updates that could affect our clients and to distinguish useful information from useless or misleading information.

 

Another group of AIs are trained by our cybersecurity experts to engage as much as possible “as human” in relevant groups in the darknet. Our experts also constantly monitor sources in the darknet. We then correlate this information to identify planned attacks or to find our clients’ stolen identity, personal information, or intellectual property.  
Information on planned cyber attacks, phishing or hacks is passed to our client who can then make changes in their defences and set up traps to isolate cyberthreats as they arrive. No other service provides this type of information.