Investigate Cyberattacks
We conduct investigations in which we seek to identify how attacks have unfolded.
We identify the tactics, techniques and procedures (TTPs) used by threat actors against our beneficiaries through in-depth investigations, malware analysis and forensics investigations, including with support from our partners. We produce bespoke investigation reports and threat intelligence for our beneficiaries, accompany them in reaching out to relevant investigative bodies and publish public blogs to raise awareness amongst vulnerable communities.
Data Acquisition
Following an assessment of the case brought to us by a beneficiary or partner, we ensure the secure transfer of case data to our analysts.
Log & Transaction Analysis
We review and analyze computer-generated event logs to proactively identify information related to the case.
Malware & Forensic Investigation
We collect evidence from devices and analyze malware to determine the root cause of an attack.
Threat Intelligence
We develop knowledge on threats, vulnerabilities and the actors behind them to mitigate future risks.
Advice & guidance
Getting to the root cause of an attack allows us to provide actionable recommendations to a specific organization or the wider community.
Practical Assistance
We provide technical and cybersecurity support to help NGOs implement the recommendations.