Monitoring deep, dark and surface web to detect exposure of your sensitive data, secret projects and initiatives, privileged users, critical systems, IT infrastructure, and more.
Monitoring and alerting of third party data breaches impacting your employees’ emails, usernames, and personally identifiable information.
Assess the risk footprint and security posture of key business relationships to get a handle on external risk introduced through your extended attack surface.

Sign Up for Updates

Digital risk monitoring of key personnel with telemetry and risk metrics. VIPRecon provides broad coverage of social media, deep and dark web, as well as physical threat assessments.
Our Ransomware Response Readiness Assessment, Playbook and Table Top Exercise gives your organization the best chance to survive and recover.
Gain visibility of your digital footprint by reaching into the most active areas of the cyber underground.
Fully managed and tailored Threat Intelligence services that becomes an extension of your current security processes and provides real-time visibility on new threats.
Providing research and investigations into known threats, to save security teams time and stress during a cyber emergency.

Sign Up for Updates

GroupSense offers a comprehensive package of services for assessing and responding to ransomware attacks, including negotiations with threat actors.
Actively researching and monitoring threats from vendors or third-party companies that can affect organizational security.
Monitoring for threats to elections, VIPs, and more on social media to proactively prevent or mitigate digital risk.
Focusing on the threats and risks that matter to your security processes and providing intelligence and insights to prevent or mitigate digital risk.
Taking the next step in security services, by proactively taking down phishing sites or anonymously interacting with threat actors to provide better intelligence.
Active monitoring of your brand's digital assets to protect its reputation and stop further brand abuse from targeting unsuspecting victims.

Sign Up for Updates

Combining your cyber and fraud programs to effectively fight threat actors continually scamming or threatening assets within an organization.
Executives are prime targets for fraudulent activities, but with a proactive approach, any attacks or threats can be neutralized before causing any damage.
Governments, political parties and candidates must all act now to activate cyber threat intelligence services to harden their information security and get ahead of inevitable cyber threats to the election process.
1 min read

Pretend Podcast: The Ransomware Negotiator

Sep 14, 2021 9:30:00 AM

Ransomware. Does that term ring a bell? Even if you've never heard those words before, trust me, most of us have experienced Ransomware one way or another. If you live on the East Coast, you remember waiting long hours at the gas pump this past May. That's because a hacking group known as DarkSide hacked the Colonial Pipeline. The hackers demanded a ransom for 75 bitcoins which is equivalent to $4.4 million. How did the hackers break into the oil company's system? Easy. Some employees used the same password they used on another account that was previously hacked. And guess what? Colonial Pipeline paid the ransom and the hackers. $4.4. million dollars—gone, just like that.

The Justice Department was able to eventually recover half of the money, $2.2 million. When we hear about news like this, we mostly ignore it. Until we run out of gas and everyone panics. But once we were able to fill up our tanks again, we all moved on and put it behind us. We often ignore stories like these because, on the surface, it sounds like hackers are attacking large corporations with tons of cash. They've got the money.

But what if I tell you that the real victims here are not just the companies, but really it's you and me. What do you think happens if the company that got hacked decides not to pay the ransom? If the company doesn't cave to the hacker's demands, the hacker will dump the company's data and make it publicly available on the dark web. By the way, the company's data is comprised of your social security number, date of birth, driver's license, and health insurance information... everything an identity thief needs to financially destroy you.

In today's episode, we'll talk to a guy whose job is to negotiate with these hackers. We're also going to talk about how you can protect your most valuable information.

Today's guests are:Kurtis Minder - CEO and co-founder at GroupSense

Eva Velasquez - President and CEO, of the Identity Theft Resource Center

Listen In...

Written by External Author

Featured