CloudSEK XVigil scans major code sharing/hosting platforms but not limited to GitHub, Bitbucket and would alert as soon as there is a match as per the asset of the Organization. The asset could range from domains, associated subdomains, associated IPs, brand watchwords, product watchwords, etc. There could be a mention of an organizations asset within a line of code inside a file, or in a repository or a simple description, all of these would be detected and reported to the Organization enabling them to take remediation steps right away.
CloudSEK XVigil monitor and report on any server credential leaks on Paste sites including but not limited to Pastebin, PasteFS.
CloudSEK XVigil monitor VIP Users/ Top executive/ Board members personal email ID’s for any potential credential leaks.
CloudSEK XVigil has built proprietary historical data of the credential’s leaks for the last 7 years which has been published on the internet. This helps the platform to identify if an organization’s employee’s credentials have leaked online. CloudSEK’s historical data lake is updated the moment a new breach is detected.
CloudSEK XVigil would identify if any data is leaked by vendors/contractors/ service providers leveraging the organisation’s assets and defined watchwords.
CloudSEK XVigil crawls through thousands of dark web forums and will identify if there is any data leaked for an organization or if someone is asking for information about them in near real-time.
CloudSEK XVigil gathers information from IRC (Internet Relay Chat) and chats rooms (Telegram) to identify if anyone is trying to weaponize or monetize or trying to gather information about an organization or its assets.
Hacking tutorials with mention of your organization of your assets.
CloudSEK XVigil scans the internet (surface, deep and dark web) to harvest any information related to any customer Credit/Debit card leaks leveraging the BIN numbers. The leaked Credit/Debit cards are alerted to the organization within minutes of detection.
CloudSEK offers end to end management of takedowns including submission, follow-ups, and confirmation. We empower the security team for better decision making and eliminating the arduous and manual process of takedowns from their day to day responsibilities. Our capable and in-house takedowns team assists with takedowns of several brand abuse incidents reported such as phishing, infringing domain, Fake social media accounts unofficial apps on third-party app stores, DMCA takedowns, etc.
Leverage our 100+ strong global partner network to integrate and secure your digital assets.
When you request access you will get a brief on