cyberintelligencehouse.com Open in urlscan Pro
2606:4700:20::6818:123c  Public Scan

Submitted URL: https://monitoring.cyberintelligence.house/
Effective URL: https://cyberintelligencehouse.com/
Submission Tags: phishingrod
Submission: On October 21 via api from DE — Scanned from SE

Form analysis 1 forms found in the DOM

POST /#wpcf7-f380-p1356-o1

<form action="/#wpcf7-f380-p1356-o1" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init">
  <div style="display: none;">
    <input type="hidden" name="_wpcf7" value="380">
    <input type="hidden" name="_wpcf7_version" value="5.7.5.1">
    <input type="hidden" name="_wpcf7_locale" value="pt_PT">
    <input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f380-p1356-o1">
    <input type="hidden" name="_wpcf7_container_post" value="1356">
    <input type="hidden" name="_wpcf7_posted_data_hash" value="">
    <input type="hidden" name="_wpcf7_recaptcha_response" value="">
  </div>
  <p><span class="wpcf7-form-control-wrap" data-name="name_user"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="Your name" value="" type="text"
        name="name_user"></span>
  </p>
  <p><span class="wpcf7-form-control-wrap" data-name="company_name"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="Company name" value="" type="text"
        name="company_name"></span>
  </p>
  <p><span class="wpcf7-form-control-wrap" data-name="email"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email" aria-required="true" aria-invalid="false" placeholder="Work email"
        value="" type="email" name="email"></span>
  </p>
  <p><span class="wpcf7-form-control-wrap" data-name="phone"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-tel wpcf7-validates-as-required wpcf7-validates-as-tel" aria-required="true" aria-invalid="false" placeholder="Your phone"
        value="" type="tel" name="phone"></span>
  </p>
  <div class="toggleMsg_container">
    <p><span onclick="toggleMsg()"><br> Add additional information <img decoding="async" id="icon_toggle" width="20px" src="/wp-content/uploads/2021/11/down-1.png"><br>
      </span>
    </p>
  </div>
  <p><span class="wpcf7-form-control-wrap" data-name="textarea"><textarea cols="40" rows="10" class="wpcf7-form-control wpcf7-textarea" id="textarea" aria-invalid="false" placeholder="Your message" name="textarea"
        style="display: none;"></textarea></span>
  </p>
  <p><span class="wpcf7-form-control-wrap" data-name="terms_acceptance"><span class="wpcf7-form-control wpcf7-acceptance"><span class="wpcf7-list-item"><label><input type="checkbox" name="terms_acceptance" value="1" aria-invalid="false"><span
              class="wpcf7-list-item-label">I agree with the Legal Terms and Data Protection Policy</span></label></span></span></span>
  </p>
  <input class="wpcf7-form-control wpcf7-hidden" value="1235775951.1729504729" type="hidden" name="ga_cookie_id">
  <span class="wpcf7-form-control-wrap recaptcha" data-name="recaptcha"><span data-sitekey="6Ld80HgfAAAAAMO0T_DdckSbIB7REwMjVWT1K5SS" class="wpcf7-form-control g-recaptcha wpcf7-recaptcha">
      <div style="width: 304px; height: 78px;">
        <div><iframe title="reCAPTCHA" width="304" height="78" role="presentation" name="a-wdjsuxhyc229" frameborder="0" scrolling="no"
            sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
            src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6Ld80HgfAAAAAMO0T_DdckSbIB7REwMjVWT1K5SS&amp;co=aHR0cHM6Ly9jeWJlcmludGVsbGlnZW5jZWhvdXNlLmNvbTo0NDM.&amp;hl=en&amp;v=lqsTZ5beIbCkK4uGEGv9JmUR&amp;size=normal&amp;cb=4gv9iiod0p7b"></iframe>
        </div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
          style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
      </div><iframe style="display: none;"></iframe>
    </span>
    <noscript>
      <div class="grecaptcha-noscript">
        <iframe loading="lazy" src="https://www.google.com/recaptcha/api/fallback?k=6Ld80HgfAAAAAMO0T_DdckSbIB7REwMjVWT1K5SS" frameborder="0" scrolling="no" width="310" height="430">
        </iframe>
        <textarea name="g-recaptcha-response" rows="3" cols="40" placeholder="reCaptcha Response Here">		</textarea>
      </div>
    </noscript>
  </span>
  <div class="submit-div">
    <p><input class="wpcf7-form-control has-spinner wpcf7-submit" type="submit" value="REQUEST A TEST DRIVE TODAY" disabled=""><span class="wpcf7-spinner"></span>
    </p>
  </div>
  <div class="wpcf7-response-output" aria-hidden="true"></div>
</form>

Text Content

 * PRODUCT
 * SOLUTIONS
   * For Risk and Security Assessments
   * For Continuous Monitoring
   * For Incident Response and Digital Forensics
   * Third Party Risk and Benchmarking
 * PARTNER WITH US
 * ABOUT US

Menu
 * PRODUCT
 * SOLUTIONS
   * For Risk and Security Assessments
   * For Continuous Monitoring
   * For Incident Response and Digital Forensics
   * Third Party Risk and Benchmarking
 * PARTNER WITH US
 * ABOUT US


 * PRODUCT
 * SOLUTIONS
   * For Risk and Security Assessments
   * For Continuous Monitoring
   * For Incident Response and Digital Forensics
   * Third Party Risk and Benchmarking
 * PARTNER WITH US
 * ABOUT US

Menu
 * PRODUCT
 * SOLUTIONS
   * For Risk and Security Assessments
   * For Continuous Monitoring
   * For Incident Response and Digital Forensics
   * Third Party Risk and Benchmarking
 * PARTNER WITH US
 * ABOUT US




CYBER EXPOSURE MONITORING AND ASSESSMENT PLATFORM
FOR CYBERSECURITY PROFESSIONALS AND MSSPS


DARKWEB, DEEPWEB, DATA BREACHES, MALWARE LOG FILES, AND ONLINE ASSETS

SCHEDULE A TEST DRIVE
SCHEDULE A TEST DRIVE


TRUSTED BY


REPORT

“Cyber Intelligence House provided data for United Nations’ report and
participated in the research and analysis…”
READ MORE


REPORTS

“Cyber Intelligence House is named in Gartner Emerging Technologies: Critical
Insights in Digital Risk Protection Services…”
READ MORE


PRESS RELEASE

“Cyber Intelligence House’s tools speed up investigations and free valuable law
enforcement resources for other critical tasks…”
READ MORE


“MANY CYBER ATTACKS WOULD HAVE BEEN PREVENTED IF ONLY THE ORGANISATIONS
HAD KNOWN WHAT THEY LOOKED LIKE FROM THE OUTSIDE.”


CYBER EXPOSURE PLATFORM

Find out your customer’s digital footprint, darkweb exposure, leaked data,
visualise their visible ICT assets, 
and discover cyberattacks in preparation. Add high-profit services to your
portfolio while helping your
consultants be more productive and efficient in tasks where their expertise is
needed.

For Risk and
Security Assessments

READ MORE
For continuous
monitoring
READ MORE
For incident response
and Digital Forensics
READ MORE

Third party risk
and benchmarking

READ MORE



CYBER EXPOSURE PLATFORM UI

CIH Cyber Exposure Platform UI is designed and automated for consultants to
perform assessments and
analysis faster. Our Licensing model is simple and transparent.

Designed for MSSPs to gain High ROI. You remain in full control of the end
customer.
We provide the technology and both technical and sales support.

Originally designed for law enforcement, we are the leading experts in Cyber
Exposure with our pioneering
technology for Darkweb intelligence.


LEADING EXPERTS IN CYBER EXPOSURE

We have ten years of coverage from darkweb, Deepweb, and Data Breaches, and our
data is utilised by organisations like Interpol and the United Nations.

Our platform is incredibly quick to deploy, and does not require extensive
training. Sign up for a test drive to find out why.

What if you could effectively manage 50% more clients by being able to
automatically identify gaps in your customer´s cyber security posture.

SCHEDULE A TEST DRIVE


Previous
Next


TAKE A TEST DRIVE

SELECT ONE OF
YOUR CLIENTS

RUN AN
ASSESSMENT

EVALUATE THE TIME YOU
SAVED ALONG THE PROCESS
INVEST YOUR SAVED TIME
TO NEW PROJECTS AND NEW CLIENTS

SCHEDULE A TEST DRIVE


POWERFUL CYBER EXPOSURE SERVICES AT YOUR FINGERTIPS


DIVE DEEP INTO
CYBER EXPOSURE



Reveal leaked internal
passwords, users’ passwords,
attack plans and reconnaissance operations, malware and more…



Understand asset specific
exposure such as past attacks
and credentials for sale



Understand what others talking about in underground forums




Benchmark against other
organizations in same industry, location or size




DISCOVER ASSETS
AND SHADOW IT



Start asset discovery with
minimal information and
knowledge




Discover your internet-facing
assets with an interactive Asset Map




Spot shadow IT and missing
assets




Implement continuous testing
with zero configuration




CREATE COMPELLING REPORTS
AND FIX VULNERABILITIES FASTER



Step-by-step instructions for remediation




Instructions prioritized by: critical, impact, time-to-fix and time-to-attack





Integrate with orchestration tools, managed detection and response services or
security operation centers




Benchmark against other
organizations in the same industry, location or size






PARTNER WITH US


Add additional information




I agree with the Legal Terms and Data Protection Policy









Leave your message and we'll respond soon

Follow us:


 * PRODUCT
 * SOLUTIONS
   * For Risk and Security Assessments
   * For Continuous Monitoring
   * For Incident Response and Digital Forensics
   * Third Party Risk and Benchmarking
 * PARTNER WITH US
 * ABOUT US

 * PRODUCT
 * SOLUTIONS
   * For Risk and Security Assessments
   * For Continuous Monitoring
   * For Incident Response and Digital Forensics
   * Third Party Risk and Benchmarking
 * PARTNER WITH US
 * ABOUT US

 * PRODUCT
 * SOLUTIONS
   * For Risk and Security Assessments
   * For Continuous Monitoring
   * For Incident Response and Digital Forensics
   * Third Party Risk and Benchmarking
 * PARTNER WITH US
 * ABOUT US

 * PRODUCT
 * SOLUTIONS
   * For Risk and Security Assessments
   * For Continuous Monitoring
   * For Incident Response and Digital Forensics
   * Third Party Risk and Benchmarking
 * PARTNER WITH US
 * ABOUT US

Cookies & Privacy | Terms & Conditions

2022 © Cyber Intelligence House – All rights reserved | Developed by Codedesign





We use cookies on our website to give you the most relevant experience by
remembering your preferences and repeat visits. By clicking “Accept All”, you
consent to the use of ALL the cookies. However, you may visit "Cookie Settings"
to provide a controlled consent.



Cookie SettingsAccept All


Manage consent
Close

PRIVACY OVERVIEW

This website uses cookies to improve your experience while you navigate through
the website. Out of these, the cookies that are categorized as necessary are
stored on your browser as they are essential for the working of basic
functionalities of the ...
Necessary
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly.
These cookies ensure basic functionalities and security features of the website,
anonymously.

CookieDurationDescriptioncookielawinfo-checkbox-analytics11 monthsThis cookie is
set by GDPR Cookie Consent plugin. The cookie is used to store the user consent
for the cookies in the category "Analytics".cookielawinfo-checkbox-functional11
monthsThe cookie is set by GDPR cookie consent to record the user consent for
the cookies in the category "Functional".cookielawinfo-checkbox-necessary11
monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to
store the user consent for the cookies in the category
"Necessary".cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR
Cookie Consent plugin. The cookie is used to store the user consent for the
cookies in the category "Other.cookielawinfo-checkbox-performance11 monthsThis
cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the
user consent for the cookies in the category
"Performance".viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie
Consent plugin and is used to store whether or not user has consented to the use
of cookies. It does not store any personal data.

Functional
Functional
Functional cookies help to perform certain functionalities like sharing the
content of the website on social media platforms, collect feedbacks, and other
third-party features.
Performance
Performance
Performance cookies are used to understand and analyze the key performance
indexes of the website which helps in delivering a better user experience for
the visitors.
Analytics
Analytics
Analytical cookies are used to understand how visitors interact with the
website. These cookies help provide information on metrics the number of
visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and
marketing campaigns. These cookies track visitors across websites and collect
information to provide customized ads.
Others
Others
Other uncategorized cookies are those that are being analyzed and have not been
classified into a category as yet.
SAVE & ACCEPT