Who is your target? What is their past behavior? What are their tactics? Who do they work with? Getting to know your adversary by answering these questions is an important step along the path to prevent future breaches or verify that bad guys are at work.

Document Historical Information & Build On It

AliasDB serves as both a research resource and documentation tool in collecting information about suspected bad actors. Access our database of 70,000 confirmed threat actors and 8,000 aliases, including documented attribution and correlation of known associates. Then use AliasDB software to edit and add to an adversary’s profile for your own use or to collaborate with a team.

Benefits

Build on historical data from the decade defacement database.

Enables you to add information to a profile for your own use.

Access snapshots of defacements.

Provides information that can be queried through a vast array of products.

Aids investigators in building dossiers on suspects.

Uses

  • Incident response
  • Case management and collaboration
  • Dossier building
  • Defacement investigations
  • Cyber Threat Intelligence

Supports

  • MSSP Teams
  • SOC Teams
  • Cyber Threat Intelligence
  • Intelligence Analysts
  • Legal Professionals
  • Detectives and Investigators

Discover your adversary’s past and build a case that moves your investigation forward.

Schedule a demo or find out more.

Scroll to Top