We’re a small team using and providing 100% full OSINT coverage for malicious software samples in the wild which we call Technical Collection sourcing using publicly accessible sources. We also have an in-house built sourcing methodology in the form of having access to approximately 500 unique malware samples circulating in the wild on a daily basis. We then systematically and on a daily basis detonate these malicious software samples and only extract the command and control infrastructure as firm believers of actionable threat intelligence and current and historical research projects support where we offer detonated malware command and control domains once again using 100% full OSINT coverage in terms of using publicly accessible sources in combination with our in-house sourcing methodology.
