Domains
Visibility to breaches across your corporate domains.
Data records are stolen every day
Login attempts involving leaked credentials in 2018
BreachRecon is a Cyber Reconnaissance service that delivers historical awareness and continuous visibility to new credential breaches affecting your business. Because breached accounts can be a conduit for attacks on your network that spread malware, exfiltrate data, or damage your company in other ways, it is critical to identify breaches quickly and remediate the possible damage they can cause.
OSINT Sources used for BreachRecon
Passwords, usernames, PII and technical metadata in BreachRecon database
Your employees can inadvertently expose your organization by using their work email and password when creating accounts on non-work websites such as LinkedIn and Netflix.
When those websites are hacked, their user databases are sold and shared amongst cyber criminals on the internet, introducing the potential for credential stuffing attacks. These attacks are where known compromised credentials are used to gain access to other login applications.
Certainly the clearest threat is direct access to an organization’s systems by leveraging stolen credentials, but there is significantly more risk involved than meets the eye.
The personally identifiable information and associated technical metadata contained in these breaches, combined with tools and other attack resources, can be used to launch more advanced attacks, including account takeover, targeted profiling, spear phishing, fraud, and insider compromise.
Know what your attackers know to get ahead of the threat. With full knowledge and early warning of new breaches, you can quickly secure known compromised accounts and counsel affected employees.
Strategically, this rich data set can be integrated and operationalized into your cyber security and Threat Intelligence functions so you can anticipate, detect and prevent sophisticated attacks.
Visibility to breaches across your corporate domains.
Data about discrete breached credentials, including additional PII and metadata.
Bulk exporting of breached data allows for internal audits and risk assessment.
Leverage credential data to enforce your password and corporate user policies.