Contact Us
Contact Us
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Subscribe to our newsletter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Managed OSINT

Defendza utilises Open Source Intelligence techniques to analyse how your organisation “leaks” data onto the internet, (for example, via network IP ranges, technology details, staff email information, key personnel information on social media). This data could be used by a sophisticated attacker to launch a phishing attack on your weakest link – Defendza keeps you safe.

Read more
Get a FREE 30 min consultation

Are you happy for Defendza to keep you informed on the latest developments in cyber security (attack reports, guidance, DIY articles)? Of course you can unsubscribe at any time. Please see our privacy policy

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Overview

Defendza utilises Open Source Intelligence techniques to analyse how your organisation “leaks” data onto the internet, (for example, via network IP ranges, technology details, staff email information, key personnel information on social media). This data could be used by a sophisticated attacker to launch a phishing attack on your weakest link – Defendza keeps you safe.

Methodology

Our regular OSINT MSS would scan for the following against your organisation

Staff details

From email address and social media websites like LinkedIn, details about the staff would be obtained. This would include -

  • Employee full names, job roles, as well as the software they use.
  • Obtain details about personal and corporate blogs
  • Identify all social networks used by the target user or company.
  • Obtain employee email addresses, telephone extension / mobile number details, personal interests from social media sites like Instagram, Twitter.

Organisation Analysis

In this phase, we obtain details about the organisation and their staff using various online sources. This includes (and is not limited to)

  • Use of multiple search engines such as Censys, Shodan, Google, Wayback machine, archives and cached search results. 
  • Job postings on the corporate website as well as on job networks.
  • Infrastructure Reconnaissance - Information such as network blocks, infrastructure components, websites, networks & DNS is collected from online sources.
  • WhoIS, Domain Search Results such as registrant information, domain squatting.
  • Review threat intelligence feeds related to the network blocks obtained.
  • Web archive / time machine to obtain data posted in the past on the corporate website.
  • Obtain data from past compromises, postings on Pastebin and GitHub.

Business Intelligence

  • Corporate information from the official website and other online financial information databases
  • Investments information, supply chain network partnerships and vendors, network providers, software in use, and other facilities. 
  • Metadata information leakage from official documents released online. This information often contains staff usernames, software in use, installation paths of software in use and file system/operating system information. 

Physical Location

A complete address including building and postal code of the organisation including details of ownership (rental, owned, shared) from which it operates. This will also include any international offices or branches that are distributed geographically around the world.

Further, where possible information about the location of cameras, gates, fences, backdoors, anti-tailgating doors and other physical security measures that are posted online or that can be found via Google maps and other online resources. This includes data obtained from Google Street view as well. 

Keep a continuous eye on your assets
Call Us Now

Testimonials

"My experience to date with Defendza has been very positive, I look for a flexible, knowledable security "partner" when I engage a PT firm. Pentest means many things to many people and there are many different use cases for both the testing activity and the report generated and I need someone to work with me to get the absolute best value out of my security budget."

Information Security Officer
Insurance Group

Excellent people to work with. Very good knowledge of requirement and give us correct findings with excellent remedy to improve our security for our B2B portal site."

Head of Technical & Business Improvement
Leading Pharmaceutical Manufacturer

"I thought it was a highly professional and thorough exercise and I would have no hesitation recommending Defendza to any of my connections."

Director, Software Engineering
Global Information and Analytics Company

"Good personal service. We are delighted with the work Defendza did for us. Highly recommended."

CTO
Manchester headquartered Global Fashion Brand

"Extremely satisfied with approach, speed and end results. Thanks."

COO
International fashion label and store

"My experience of the Defendza team was 5 star.  They were so helpful, and their technical delivery and client communication were excellent."

Director, Software Development
Corporate Services Company

Key Benefits

Our MSS team is waiting at
Call Us Now

Related Services