Outside Intel

On Demand Threat Research

Proactive and preventative investigations that reveal threat actor context and risk correlations.

Consume and Operationalize

Investigate Any Cyber Threat Globally

Nisos enhances your cyber threat intelligence program – enabling you to consume and operationalize multi-source data. We help cybersecurity teams stop adversaries by informing cyber ops, improving defenses, and disrupting attack patterns.

Custom

Client-Specific Data and Solution

This service leverages our vast data collection to perform expert analysis on a key set of client-specific information. We fuse your information with ours and apply external telemetry with the internal data to proactively determine proper controls needed to maintain business operations. We can also attribute the adversary to help prevent future attacks by the same actor.

Custom

Client-Specific Data and Solution

This service leverages our vast data collection to perform expert analysis on a key set of client-specific information. We fuse your information with ours and apply external telemetry with the internal data to proactively determine proper controls needed to maintain business operations. We can also attribute the adversary to help prevent future attacks by the same actor.

Our Approach

Smarter Investigations

Internal SOCs should leverage their cyber threat intelligence teams to prioritize and help resolve critical cyber risks, but they may not have the capability to investigate in greater granularity. Nisos combines threat intelligence, analyst-led investigations, and external visibility to bring time-sensitive actionable intelligence priorities to your team.

We can support threat hunting, vulnerability management, red teaming, adversary emulation, application security, the security engineering team, and unique, high-target business units. We bring the intelligence perspective to empower the confidentiality, integrity and availability of your critical systems and information.

Our Approach

Smarter Investigations

Internal SOCs should leverage their cyber threat intelligence teams to prioritize and help resolve critical cyber risks, but they may not have the capability to investigate in greater granularity. Nisos combines threat intelligence, analyst-led investigations, and external visibility to bring time-sensitive actionable intelligence priorities to your team.

We can support threat hunting, vulnerability management, red teaming, adversary emulation, application security, the security engineering team, and unique, high-target business units. We bring the intelligence perspective to empower the confidentiality, integrity and availability of your critical systems and information.

Differentiated 

Intelligence is Not Just Threat Information

Information doesn’t become intelligence until it has been contextualized and broken into actionable subsets. Short-fused investigations and research focus on detecting and avoiding incidents. Nisos can help address control gaps for mitigation and attribute the adversary.

Key Areas We Assist

Indicators of Compromise and Selector Enrichment

For example, identifying infrastructure being used by the actor, gathering information about other organizations possibly affected by the attack, attributing tools and TTPs, and revealing intel feed value.

Internal Domain Leakage

For example, investigating DNS queries and domain registrations and researching certificate abuse. Helping to track security flows that allow DNS requests to be publicly revealed.

Data Dumps

For example, monitoring Pastebin, GitHub, and more for leaked identities and data dumps. Searching for sensitive client data shared on forums, chat rooms, and OSINT platforms. Reviewing threat actor TTPs for adversary emulation.

Deliverables

Reports Available

Nisos provides on-demand threat intel investigations, enabling you to take action and protect your people, your business, and your assets with rapid and curated responses to intelligence questions and concerns.

Get the information you need:

  • Fast Inquiry: an on-demand request for information that includes a curated response to your specific-intelligence question
  • Situation Briefing: an on-demand summary status report of an ongoing situation or activity monitored by Nisos researchers and analysts
  • Spot Report: a supplemental brief used to quickly communicate time-sensitive intelligence for significant events impacting a client
Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights Retainer℠
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks