User Tools

Site Tools


start

This is an old revision of the document!


MAIN WIKI KADUU.IO

Welcome to Kaduu Wiki. Kaduu is a SaaS based platform offering Darknet & Deep Web monitoring. You can find more information about the product here https://kaduu.io. Please find below technical articles about our various features. If you have any questions, please contact support@kaduu.io.


FUNCTIONALITY:PREVENT ATTACKS

In today's interconnected world, organizations are prime targets for cyberattacks, with phishing and malware attacks being among the most prevalent. Early detection is key, and our Threat Intelligence Product enables precisely that.\\

Cyber attackers often employ strategies like typo squatting, a tactic where they register domains that closely resemble legitimate ones. An example would be an attacker targeting a bank and registering a domain like 'www.bannkofexample.com'. At a quick glance, your customers or employees might not spot the difference, thus falling prey to the attacker's tactics.\\

That's where our Threat Intelligence Product steps in. It vigilantly monitors all new global domain registrations for similarities to your own. This proactive approach helps identify potential threats at their genesis, allowing you to thwart an attack before it materializes.\\

However, attackers can be crafty, often embedding your organization's name within a subdomain or a directory. For instance, they might use URLs like 'www.randomsite.com/yourbankname' or 'yourbankname.fakesite.org'. Such subtle incorporations are designed to exploit human oversight and amplify the attacker's success rate.

Our product enhances your defense by not only tracking domain registrations but also by monitoring SSL Transparency logs, allowing you to also detect your domain name within the subdomain part of a malicious URL. SSL Transparency logs are public records maintained by SSL providers detailing each SSL certificate issued. Scrutinizing these logs aids in unmasking potential hidden threats lurking in the subdomains.\\

Further fortifying your cyber defense, our product integrates information from resources like PhishTank, OpenPhish and similar sources. These repositories maintain a global database of URLs reported for phishing or disseminating malware, allowing us to also detect your company or brand name within a directory of a URL.

By amalgamating these varied sources of intelligence, our product provides you with comprehensive, real-time visibility into potential cyber threats.

PASSIVE DOMAIN RESEARCH IN EXPERT MODE

ACTIVE DOMAIN RESEARCH

SSL MONITORING

3RD PARTY PHISHING AND MALWARE REPORTS

SOCIAL MEDIA SPOOFING

MOBILE APP SPOOFING

DETECT EXPOSED CODE, SENSITIVE DATA OR VULNERABILITIES

EXPOSED INFRASTRUCTURE OR DATA IN DEEPWEB

EMPLOYEES EXPOSURE

FIND OUT IF SOMEONE TALKS ABOUT YOU IN THE DARKNET OR SELLS YOUR DATA

DEEP WEB AND DARKNET MENTIONING

FIND OUT IF DATA HAS BEEN LEACKED IN THE PAST

LEAK SEARCH IN EXPERT MODE

CREDIT CARD SEARCH IN EXPERT MODE

RANSOMWARE MONITORING

start.1686044066.txt.gz · Last modified: 2023/06/06 11:34 by kaduuwikiadmin