User Tools

Site Tools


start

This is an old revision of the document!


WIKI DIRECTORY

Welcome to Kaduu Wiki. Kaduu is a SaaS based platform offering Darknet & Deep Web monitoring. You can find more information about the product here https://kaduu.io. Please find below technical articles about our various features. If you have any questions, please contact support@kaduu.io.


FUNCTIONALITY:PREVENT ATTACKS

In today's interconnected world, organizations are prime targets for cyberattacks, with phishing and malware attacks being among the most prevalent. Early detection is key, and our Threat Intelligence Product enables precisely that.
Cyber attackers often employ strategies like typo squatting, a tactic where they register domains that closely resemble legitimate ones. An example would be an attacker targeting a bank and registering a domain like 'www.bannkofexample.com'. At a quick glance, your customers or employees might not spot the difference, thus falling prey to the attacker's tactics. That's where our Threat Intelligence Product steps in. It vigilantly monitors all new global domain registrations for similarities to your own. This proactive approach helps identify potential threats at their genesis, allowing you to thwart an attack before it materializes. However, attackers can be crafty, often embedding your organization's name within a subdomain or a directory. For instance, they might use URLs like 'www.randomsite.com/yourbankname' or 'yourbankname.fakesite.org'. Such subtle incorporations are designed to exploit human oversight and amplify the attacker's success rate. Our product enhances your defense by not only tracking domain registrations but also by monitoring SSL Transparency logs, allowing you to also detect your domain name within the subdomain part of a malicious URL. SSL Transparency logs are public records maintained by SSL providers detailing each SSL certificate issued. Scrutinizing these logs aids in unmasking potential hidden threats lurking in the subdomains. Further fortifying your cyber defense, our product integrates information from resources like PhishTank, OpenPhish and similar sources. These repositories maintain a global database of URLs reported for phishing or disseminating malware, allowing us to also detect your company or brand name within a directory of a URL. By amalgamating these varied sources of intelligence, our product provides you with comprehensive, real-time visibility into potential cyber threats.

PASSIVE DOMAIN RESEARCH IN EXPERT MODE

ACTIVE DOMAIN RESEARCH

SSL MONITORING

3RD PARTY PHISHING AND MALWARE REPORTS

SOCIAL MEDIA SPOOFING

MOBILE APP SPOOFING


DETECT EXPOSED CODE, SENSITIVE DATA OR VULNERABILITIES

EXPOSED INFRASTRUCTURE

EXPOSED EMPLOYEES


FIND OUT IF SOMEONE TALKS ABOUT YOU IN THE DARKNET OR DEEPWEB

DEEP WEB AND DARKNET MENTIONING


FIND OUT IF DATA HAS BEEN LEACKED

LEAK SEARCH IN EXPERT MODE

CREDIT CARD SEARCH IN EXPERT MODE

BOTNET SEARCH

RANSOMWARE MONITORING


COMPARE THE DATA

——–

ALERTS


ACCESS & EXPORT DATA


SETUP OPTIONS


GENERAL TOPICS

start.1685895063.txt.gz · Last modified: 2023/06/04 18:11 by kaduuwikiadmin