New NordStellar Feature Searches Through Cybercrime Communities

Dark Web Monitoring provides visibility of the deep and dark web

NordStellar, a threat exposure management platform developed by Nord Security, is launching a new functionality called Dark Web Monitoring.

Available in Beta version, this feature allows companies to track various keywords across dark web forums, deep web search engines, illicit markets, hacking communities, Telegram channels, and other sources.

“Businesses will be able to look up keywords associated with the company and proactively identify risks, take action and prevent security incidents or reputational damage,” says Vakaris Noreika, head of product at NordStellar.

With the monitoring of the deep and dark web, NordStellar is providing more insight than the traditional threat intelligence solutions. Such monitoring allows companies to take a closer look at the threat actor communities to identify the threat source and mitigate potential business risks.

“The information shared on hacker forums and chat rooms can be invaluable for a company’s security,” notes Vakaris Noreika, head of product at NordStellar. “Things like fake, malware-embedded applications that mimic a legitimate product, stolen customer accounts, and company backdoors are just a few examples of what you can find for sale in hacker forums. Being aware of such things can help the company protect not only itself and the brand, but its customers, too.”

To further enhance this feature, NordStellar is working on continuous keyword monitoring, meaning that users would receive alerts once their monitored keywords are mentioned. This enhancement is forecasted to be released later this year.

Released in May this year, NordStellar aims to look at an organization from an attacker’s point of view, providing insight to cybersecurity gaps and helping companies identify those gaps. NordStellar allows companies to check for leaked employee data, identify signs of malware, and offers customer account takeover prevention solutions.

Previous ArticleNext Article