Implementation method

Step 1
Provide information about compromised/leaked data on forums, underground forums, black markets, deep/dark web, social networks, data sharing websites, source code repositories, ... related to the customer.
Step 2
Provide information about targeted malware.
Step 3
Provide information about vulnerabilities (CVEs)
Step 4
Provide general information about new threats, malware, security incidents in the world
Step 5
Provide security research reports from GTSC's experts (0-day vulnerability, in-depth technical analysis, ...)
Step 6
Support integration with SIEM systems


Threat Intelligence will be provided to the customer via a web portal, the customers use a provided account to access or use API/STIX/TAXII to integrate into their defense systems.
Published vulnerabilities or compromised data related to customers will be updated and sent directly to them.