DomainGuard

Social Engineering & Dark Web

Phishing, vishing, and continuous monitoring for dark web exposure of your accounts and credentials.

SOCIAL ENGINEERING

The human attack surface.

Phishing continues to be the easiest way into an organization, and the primary breach vector. Customers and employees are also becoming targets of impersonation.

The goal of these engagements is to exploit the human element and create awareness around unconventional attack vectors, so your team learns to recognize them before a real attacker does.

Phishing: Website Cloning

DomainGuard targets externally facing assets, with the goal of cloning the asset and tricking employees into submitting business credentials into the fake phishing website.

Vishing: Phone Calls

DomainGuard targets phone systems to attempt to obtain private information from employees. Attackers may impersonate voice-automated systems and other official accounts to get victims to reveal sensitive information.

DARK WEB ASSESSMENT

Visibility into adversarial data.

Attackers can purchase compromised accounts or harvest third-party data breaches to access an organization. Users reuse passwords. Customer machines are compromised. We surface those signals before they're acted on.

Dark Web Artifacts

What we look for across public, private, and adversarial data sources.

Customer Account Compromise

DomainGuard scours public and private data sources, as well as the dark web, to identify access to customer accounts sold on adversarial marketplaces.

Third-Party Data Breach

DomainGuard identifies employees who were recently in a third-party data breach. Historical data is prepared to identify trends with employees who may be at higher risk.

Leaked Credentials

In addition to third-party breach data, DomainGuard checks adversarial forums for leaked credentials that may disclose sensitive employee credentials.