cyberintelligencehouse.com
Open in
urlscan Pro
2606:4700:20::6818:123c
Public Scan
Submitted URL: https://monitoring.cyberintelligence.house/
Effective URL: https://cyberintelligencehouse.com/
Submission Tags: phishingrod
Submission: On October 21 via api from DE — Scanned from SE
Effective URL: https://cyberintelligencehouse.com/
Submission Tags: phishingrod
Submission: On October 21 via api from DE — Scanned from SE
Form analysis
1 forms found in the DOMPOST /#wpcf7-f380-p1356-o1
<form action="/#wpcf7-f380-p1356-o1" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init">
<div style="display: none;">
<input type="hidden" name="_wpcf7" value="380">
<input type="hidden" name="_wpcf7_version" value="5.7.5.1">
<input type="hidden" name="_wpcf7_locale" value="pt_PT">
<input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f380-p1356-o1">
<input type="hidden" name="_wpcf7_container_post" value="1356">
<input type="hidden" name="_wpcf7_posted_data_hash" value="">
<input type="hidden" name="_wpcf7_recaptcha_response" value="">
</div>
<p><span class="wpcf7-form-control-wrap" data-name="name_user"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="Your name" value="" type="text"
name="name_user"></span>
</p>
<p><span class="wpcf7-form-control-wrap" data-name="company_name"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" placeholder="Company name" value="" type="text"
name="company_name"></span>
</p>
<p><span class="wpcf7-form-control-wrap" data-name="email"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email" aria-required="true" aria-invalid="false" placeholder="Work email"
value="" type="email" name="email"></span>
</p>
<p><span class="wpcf7-form-control-wrap" data-name="phone"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-tel wpcf7-validates-as-required wpcf7-validates-as-tel" aria-required="true" aria-invalid="false" placeholder="Your phone"
value="" type="tel" name="phone"></span>
</p>
<div class="toggleMsg_container">
<p><span onclick="toggleMsg()"><br> Add additional information <img decoding="async" id="icon_toggle" width="20px" src="/wp-content/uploads/2021/11/down-1.png"><br>
</span>
</p>
</div>
<p><span class="wpcf7-form-control-wrap" data-name="textarea"><textarea cols="40" rows="10" class="wpcf7-form-control wpcf7-textarea" id="textarea" aria-invalid="false" placeholder="Your message" name="textarea"
style="display: none;"></textarea></span>
</p>
<p><span class="wpcf7-form-control-wrap" data-name="terms_acceptance"><span class="wpcf7-form-control wpcf7-acceptance"><span class="wpcf7-list-item"><label><input type="checkbox" name="terms_acceptance" value="1" aria-invalid="false"><span
class="wpcf7-list-item-label">I agree with the Legal Terms and Data Protection Policy</span></label></span></span></span>
</p>
<input class="wpcf7-form-control wpcf7-hidden" value="1235775951.1729504729" type="hidden" name="ga_cookie_id">
<span class="wpcf7-form-control-wrap recaptcha" data-name="recaptcha"><span data-sitekey="6Ld80HgfAAAAAMO0T_DdckSbIB7REwMjVWT1K5SS" class="wpcf7-form-control g-recaptcha wpcf7-recaptcha">
<div style="width: 304px; height: 78px;">
<div><iframe title="reCAPTCHA" width="304" height="78" role="presentation" name="a-wdjsuxhyc229" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Ld80HgfAAAAAMO0T_DdckSbIB7REwMjVWT1K5SS&co=aHR0cHM6Ly9jeWJlcmludGVsbGlnZW5jZWhvdXNlLmNvbTo0NDM.&hl=en&v=lqsTZ5beIbCkK4uGEGv9JmUR&size=normal&cb=4gv9iiod0p7b"></iframe>
</div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</span>
<noscript>
<div class="grecaptcha-noscript">
<iframe loading="lazy" src="https://www.google.com/recaptcha/api/fallback?k=6Ld80HgfAAAAAMO0T_DdckSbIB7REwMjVWT1K5SS" frameborder="0" scrolling="no" width="310" height="430">
</iframe>
<textarea name="g-recaptcha-response" rows="3" cols="40" placeholder="reCaptcha Response Here"> </textarea>
</div>
</noscript>
</span>
<div class="submit-div">
<p><input class="wpcf7-form-control has-spinner wpcf7-submit" type="submit" value="REQUEST A TEST DRIVE TODAY" disabled=""><span class="wpcf7-spinner"></span>
</p>
</div>
<div class="wpcf7-response-output" aria-hidden="true"></div>
</form>
Text Content
* PRODUCT * SOLUTIONS * For Risk and Security Assessments * For Continuous Monitoring * For Incident Response and Digital Forensics * Third Party Risk and Benchmarking * PARTNER WITH US * ABOUT US Menu * PRODUCT * SOLUTIONS * For Risk and Security Assessments * For Continuous Monitoring * For Incident Response and Digital Forensics * Third Party Risk and Benchmarking * PARTNER WITH US * ABOUT US * PRODUCT * SOLUTIONS * For Risk and Security Assessments * For Continuous Monitoring * For Incident Response and Digital Forensics * Third Party Risk and Benchmarking * PARTNER WITH US * ABOUT US Menu * PRODUCT * SOLUTIONS * For Risk and Security Assessments * For Continuous Monitoring * For Incident Response and Digital Forensics * Third Party Risk and Benchmarking * PARTNER WITH US * ABOUT US CYBER EXPOSURE MONITORING AND ASSESSMENT PLATFORM FOR CYBERSECURITY PROFESSIONALS AND MSSPS DARKWEB, DEEPWEB, DATA BREACHES, MALWARE LOG FILES, AND ONLINE ASSETS SCHEDULE A TEST DRIVE SCHEDULE A TEST DRIVE TRUSTED BY REPORT “Cyber Intelligence House provided data for United Nations’ report and participated in the research and analysis…” READ MORE REPORTS “Cyber Intelligence House is named in Gartner Emerging Technologies: Critical Insights in Digital Risk Protection Services…” READ MORE PRESS RELEASE “Cyber Intelligence House’s tools speed up investigations and free valuable law enforcement resources for other critical tasks…” READ MORE “MANY CYBER ATTACKS WOULD HAVE BEEN PREVENTED IF ONLY THE ORGANISATIONS HAD KNOWN WHAT THEY LOOKED LIKE FROM THE OUTSIDE.” CYBER EXPOSURE PLATFORM Find out your customer’s digital footprint, darkweb exposure, leaked data, visualise their visible ICT assets, and discover cyberattacks in preparation. Add high-profit services to your portfolio while helping your consultants be more productive and efficient in tasks where their expertise is needed. For Risk and Security Assessments READ MORE For continuous monitoring READ MORE For incident response and Digital Forensics READ MORE Third party risk and benchmarking READ MORE CYBER EXPOSURE PLATFORM UI CIH Cyber Exposure Platform UI is designed and automated for consultants to perform assessments and analysis faster. Our Licensing model is simple and transparent. Designed for MSSPs to gain High ROI. You remain in full control of the end customer. We provide the technology and both technical and sales support. Originally designed for law enforcement, we are the leading experts in Cyber Exposure with our pioneering technology for Darkweb intelligence. LEADING EXPERTS IN CYBER EXPOSURE We have ten years of coverage from darkweb, Deepweb, and Data Breaches, and our data is utilised by organisations like Interpol and the United Nations. Our platform is incredibly quick to deploy, and does not require extensive training. Sign up for a test drive to find out why. What if you could effectively manage 50% more clients by being able to automatically identify gaps in your customer´s cyber security posture. SCHEDULE A TEST DRIVE Previous Next TAKE A TEST DRIVE SELECT ONE OF YOUR CLIENTS RUN AN ASSESSMENT EVALUATE THE TIME YOU SAVED ALONG THE PROCESS INVEST YOUR SAVED TIME TO NEW PROJECTS AND NEW CLIENTS SCHEDULE A TEST DRIVE POWERFUL CYBER EXPOSURE SERVICES AT YOUR FINGERTIPS DIVE DEEP INTO CYBER EXPOSURE Reveal leaked internal passwords, users’ passwords, attack plans and reconnaissance operations, malware and more… Understand asset specific exposure such as past attacks and credentials for sale Understand what others talking about in underground forums Benchmark against other organizations in same industry, location or size DISCOVER ASSETS AND SHADOW IT Start asset discovery with minimal information and knowledge Discover your internet-facing assets with an interactive Asset Map Spot shadow IT and missing assets Implement continuous testing with zero configuration CREATE COMPELLING REPORTS AND FIX VULNERABILITIES FASTER Step-by-step instructions for remediation Instructions prioritized by: critical, impact, time-to-fix and time-to-attack Integrate with orchestration tools, managed detection and response services or security operation centers Benchmark against other organizations in the same industry, location or size PARTNER WITH US Add additional information I agree with the Legal Terms and Data Protection Policy Leave your message and we'll respond soon Follow us: * PRODUCT * SOLUTIONS * For Risk and Security Assessments * For Continuous Monitoring * For Incident Response and Digital Forensics * Third Party Risk and Benchmarking * PARTNER WITH US * ABOUT US * PRODUCT * SOLUTIONS * For Risk and Security Assessments * For Continuous Monitoring * For Incident Response and Digital Forensics * Third Party Risk and Benchmarking * PARTNER WITH US * ABOUT US * PRODUCT * SOLUTIONS * For Risk and Security Assessments * For Continuous Monitoring * For Incident Response and Digital Forensics * Third Party Risk and Benchmarking * PARTNER WITH US * ABOUT US * PRODUCT * SOLUTIONS * For Risk and Security Assessments * For Continuous Monitoring * For Incident Response and Digital Forensics * Third Party Risk and Benchmarking * PARTNER WITH US * ABOUT US Cookies & Privacy | Terms & Conditions 2022 © Cyber Intelligence House – All rights reserved | Developed by Codedesign We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent. Cookie SettingsAccept All Manage consent Close PRIVACY OVERVIEW This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the ... Necessary Necessary Always Enabled Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. CookieDurationDescriptioncookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. Functional Functional Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features. Performance Performance Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. Analytics Analytics Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. Advertisement Advertisement Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads. Others Others Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet. SAVE & ACCEPT