WHAT IS it?
The Dark Web is a hidden universe
contained within the “Deep Web”- a sub-layer
of the Internet that is hidden from
conventional search engines. Search
engines like Google, BING and Yahoo only
search .04% of the indexed or “surface”
Internet. The other 99.96% of the Web
consists of databases, private academic and
government networks, and the Dark Web.
The Dark Web is estimated at 550 times
larger than the surface Web and growing.
Because you can operate anonymously, the
Dark Web holds a wealth of stolen data and
HOW CAN WOLFE SYSTEMS PROTECT MY ORGANISATION?
Our service is designed to help both public and private sector organisations detect and
mitigate cyber threats that leverage stolen email addresses and passwords.
We can explore and leverage a combination of human and
artificial intelligence that scours botnets, criminal chat rooms, blogs, Websites and bulletin boards, Peer to Peer networks, forums, private networks, and other black market sites 24/7, 365 days a year to identify stolen credentials and other personally identifiable information (PII).
HOW ARE THE STOLEN OR EXPOSED CREDENTIALS FOUND ON THE DARK WEB?
Wolfe Systems can explicitly focus on cyber threats that are specific to our clients’ environments. We monitor the Dark Web and the criminal hacker underground for exposure of our clients’ credentials to malicious individuals. We accomplish this by looking specifically for our clients’ top level email domains. When a credential is identified, we harvest it. While we harvest data from typical hacker sites like Pastebin, a lot of our data originates from sites that require credibility or a membership within the hacker community to enter.
To that end, we monitor over 500 distinct Internet relay chatroom (IRC) channels, 600,000 private
Websites, 600 twitter feeds, and execute 10,000 refined queries daily.
We Can Assess Your Current Risk
We will run a FREE Dark Web Scan for your Organisation, to evaluate your current Risk Posture.
On going Monitoring will allow you to know when there are new exposures associated with your domain, so you can take the actions to close the doors before a criminal accesses your network, your data, your business.