THE BEST CYBER INTELLIGENCE RESOURCES available via our cyberwatch api

The CyberWatch API is your access to the best cyber threat intelligence analysis resources. Get access quickly to high quality collection sets including Sinkholes, Keylogger collections, Malicious Emails, and more.

 

WAPACK PROPRIETARY COLLECTIONS

Keylogger Collections that yield thousands of newly compromised global accounts on a daily basis in industries ranging from shipping/ receiving to port operations to manufacturing and finance.  

Sinkhole Intelligence activities that focus on the use of honeypots and sinkhole techniques placed in specific locations. The intent is to not collect everything, rather take specific information – and then leave.  

Malicious Emails found by monitoring malware analysis sites for internal and external activity suggesting potential threats. Emails, keywords/ phrases, are all captured, analyzed.

Pastebin resources allow tracking of financial crime forums, targeting and collecting information on dozens of top hackers. As of 2015 Pastbin includes up to  95 million active pastes.

CYBER THREAT INDEX

Monitor Intelligence Chatter. Watch the How-To Video

Monitoring and quantifying intelligence chatter -Employs easily understood data algorithms to monitor the potential for cyber attacks and presents it in a way easily understood by all. Click through the graphics to view the intelligence identified. Application Program Interface (API) available for use in your analysis engine, or presented at cyberwatch.wapacklabs.com.

THREAT RECON

Capture Cyber Threat Indicators.  Watch the How-To Video.

Threat Recon™ is a cyber threat indicator search engine. Search for an indicator. If we’ve seen it, we’ll tell you what we know from our own sources, and select sources on the Internet. If we haven’t seen it, submit it to us! Indicators are have attribution when we know it, and are analyzed and ranked by confidence from 0 to 90%. Use the web interface for manual searches, or the REST API for JSON machine to machine queries.

TARGETEERTM

Click to Open PDF

Click to Open PDF

Take the fight to the streets.  We identify the attacker. You go after them with business, financial, political, or legal means.  There are dozens of legal capabilities that exist that allow defenders to take action against attackers. We put a face on the bad guy –for your HR, Legal, or Political action.