Skip to content

ThreatLens Beta – See The Whole Picture for Your Business

  • by
ThreatLens social media finding

It’s been a long time coming, but we are finally ready to announce and launch the beta of our flagship OSINT-led platform, ThreatLens(R). What does it do? Well if you’re busy and need a TL;DR, here goes:

  • Daily scans of your domains for potential vulnerabilities, misconfigurations or items that need attention
  • Identification of subdomain takeover vulnerabilities, open ports and possible CVEs mapped against those, including whether or not they’re known to be exploited (with full information)
  • Daily checks for potential phishing and brand impersonation threats from newly registered websites, infringements on brand imagery/likeness, typosquats and more
  • Weekly external vulnerability scans
  • Compromised credentials across domains including stealer logs, data breaches and combination lists
  • VIP Monitoring as-a-Service – Understand your digital footprint, take steps to reduce the risk.
  • Brand Monitoring across the Internet for brand sentiment and potential threats
  • It’s all totally modular too, so you can either pick from our base of modules, or you can go full a la carte.

This beta launch sees each of our core categories getting some attention, but we are proactively developing and implementing new modules and testing capabilities constantly. Today’s version of ThreatLens is almost certainly going to be different from next month’s version of ThreatLens.

What is ThreatLens?

ThreatLens Dashboard

 

Great question! For us, ThreatLens is the culmination of years in the cyber trenches, battling lists or images of indicators of compromise (IOCs), yes seriously sometimes people would share lists of IP addresses, file hashes or website URLs as images so you need to manually type them out. But we identified what we think is a valuable lesson – There’s so much noise and so many things vying for your limited attention, and yet they are all almost exclusively about things that have nothing to do with your company.

Cyber Threat Intelligence (CTI) is a force-multiplier for organisations, 100%, but it has to be useful. If you’re a small accountancy firm in Cheshire, you probably don’t need to worry that the IOCs from a North Korean APT targeting South Korean entities aren’t in your blocklist. And if you think that you should be worried… Well either that’s an interesting set of customers you have, or maybe there’s a misguided assessment about targeted cyber attacks.

Our approach to this is pretty simple. Let’s ignore the noise, and let’s look at your business only. We believe that most cyber attacks tend to be opportunistic and not specifically targeted, and that if we can find the things that can be exploited before the villains do, then hopefully we can mitigate against them. Then it’s up to you to do the basics right inside the company.

What does that mean in practice? We look for the compromised passwords, the malware that might be on a personal device, the outdated web servers in need of a patch etc. – These are things that our experience tells us a lot of more traditional tools might not find. And that’s where our experience in open-source intelligence (OSINT) starts to shine.

ThreatLens VIP Monitoring example

 

We call it Attack Surface Intelligence (ASI), but you could call it OSINT, you could call it CTI. Ultimately, it’s all about keeping your organisation safe from cybercriminals by looking where they’d be looking to target you.

Who Is ThreatLens For?

Does your business have an Internet presence or otherwise use the Internet to conduct its activities? If so, then we can probably help you reduce your risk exposure online. But ultimately:

  • Small-Medium companies who may not have a fully-built out or developed security team
  • Enterprise organisations with a myriad of child organisations or complex infrastructure setups and the need to maintain vigilance across tens or hundreds of domains
  • Businesses in sectors that are heavily regulated or where data loss could be significantly damaging to reputation

Ultimately, if you feel like your business doesn’t fully understand how it looks from the outside world, our approach is simple. We look from the outside-in to identify potential threats that could be used to harm your business – Whether through cyber attack, extortion or reputational damage.

How Does ThreatLens Work?

ThreatLens works by using a combination of automation and manual OSINT processes, these inputs are collated, and assessed initially by an AI agent (where it makes sense to do so) for an assessment. Anything that receives a High or Critical rating gets flagged to a human analyst to verify. For some scans, we use best in class tooling to obtain the data, for other modules, such as VIP Monitoring, this is a much more bespoke, human-led endeavour that requires an analysts full attention.

ThreatLens detected phishing pages

 

For most customers, this means they’ll also receive a monthly report, in plain-English, written by a human analyst. This cuts through the data from the month, identifies what was important, needs attention or what happened. We like to think of ourselves as agile and flexible at Perspective Intelligence, so monthly reports can be done to suit the needs of the business (e.g. pretty slides/long-form report/interpretive dance) – That last one was a joke, but we believe that intelligence is only useful when it can be consumed and used. Shocking, we know.

We said earlier that it’s modular, and it truly is. We can turn specific tasks on or off as needed. Only want VIP Monitoring? We can do that. Want us to do daily domain scans and check for phishing threats to your business? Consider it done. We don’t believe that, especially as a new product in a competitive market, that we would do ourselves any favours if we force you into accessing parts of the capability you don’t need or already have something in place for. So if there’s a specific part you’d be interested in, let us know.

ThreatLens social media finding

 

How Much Does ThreatLens Cost?

For the beta launch of ThreatLens, we have our pricing model that is a boilerplate of features vs domains, and these range from £999-£4999 per month, with a two month discount if buying a year in advance. This is subject to change, and likewise, if you have specific needs or changes to those boilerplates, let’s talk. Our goal is to be flexible, affordable and to become one of the partners you know you can lean on.

Want To See ThreatLens In Action?

If this article has you intrigued on how you could potentially use ThreatLens to protect your business, we’d love to hear from you! Complete the form below today to let us know and we will be in touch.

Let’s use OSINT to beat cybercrime.

Aaron Roberts

Founder, Perspective Intelligence