nightlion.com
Open in
urlscan Pro
2606:4700:20::681a:4af
Public Scan
Submitted URL: https://www.dataviper.io/blog/2019/pdl-data-exposure-billion-people/
Effective URL: https://nightlion.com/
Submission Tags: falconsandbox
Submission: On October 17 via api from US — Scanned from DE
Effective URL: https://nightlion.com/
Submission Tags: falconsandbox
Submission: On October 17 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST /#gf_16
<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_16" id="gform_16" class="wdac-form nl-hide-gform_hidden gform_legacy_markup" action="/#gf_16" novalidate="">
<div class="gform_body gform-body">
<ul id="gform_fields_16" class="gform_fields top_label form_sublabel_below description_below">
<li id="field_16_8" class="gfield gf_left_half gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label" for="input_16_8">Name<span class="gfield_required"><span
class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_text"><input name="input_8" id="input_16_8" type="text" value="" class="large" aria-required="true" aria-invalid="false"> </div>
</li>
<li id="field_16_2" class="gfield gf_right_half field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label" for="input_16_2">Company</label>
<div class="ginput_container ginput_container_text"><input name="input_2" id="input_16_2" type="text" value="" class="large" aria-invalid="false"> </div>
</li>
<li id="field_16_3" class="gfield gf_left_half gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label" for="input_16_3">Email<span class="gfield_required"><span
class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_email">
<input name="input_3" id="input_16_3" type="email" value="" class="large" aria-required="true" aria-invalid="false">
</div>
</li>
<li id="field_16_9" class="gfield gf_right_half field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label" for="input_16_9">Phone</label>
<div class="ginput_container ginput_container_text"><input name="input_9" id="input_16_9" type="text" value="" class="large" aria-invalid="false"> </div>
</li>
<li id="field_16_5" class="gfield your-message gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label" for="input_16_5">Confidential Message<span class="gfield_required"><span
class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_textarea"><textarea name="input_5" id="input_16_5" class="textarea medium" aria-required="true" aria-invalid="false" rows="10" cols="50"></textarea></div>
</li>
<li id="field_16_11" class="gfield gfield_html gfield_html_formatted gfield_no_follows_desc field_sublabel_below field_description_below gfield_visibility_visible">
<div id="custom_html-2" class="widget_text widget-even widget-2 widget widget_custom_html widget-shortcode area-arbitrary ">
<div class="textwidget custom-html-widget">
<script type="application/javascript">
jQuery(function($) {
function labelFloat() {
var onClass = "on";
var showClass = "show";
var form = ".wdac-form";
var target = form + " .gfield";
var allInputs = $(form + " input," + form + " textarea");
$(allInputs).on("checkval", function() {
var label = $(this).parent().prevAll("label");
if (this.value !== "") {
label.closest(target).addClass(showClass);
} else {
label.closest(target).removeClass(showClass);
}
}).on("input", function() {
$(allInputs).trigger("checkval");
}).on("focus", function() {
$(this).closest(target).addClass(onClass);
}).on("blur", function() {
$(this).closest(target).removeClass(onClass);
});
}
function submitWrap() {
$('.wdac-form .gform_footer input[type="submit"]').wrap('<div class="wdac-iconwrap"></div>');
}
$(document).ready(function() {
labelFloat();
submitWrap();
});
});
</script>
</div>
</div>
</li>
<li id="field_16_12" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible">
<div class="ginput_container ginput_container_text"><input name="input_12" id="input_16_12" type="hidden" class="gform_hidden" aria-invalid="false" value="Home (ID: 13997)"></div>
</li>
<li id="field_16_14" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible">
<div class="ginput_container ginput_container_text"><input name="input_14" id="input_16_14" type="hidden" class="gform_hidden" aria-invalid="false" value="https://nightlion.com/"></div>
</li>
<li id="field_16_13" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible">
<div class="ginput_container ginput_container_text"><input name="input_13" id="input_16_13" type="hidden" class="gform_hidden" aria-invalid="false" value="31.206.8.213"></div>
</li>
</ul>
</div>
<div class="gform_footer top_label">
<div class="wdac-iconwrap"><input type="submit" id="gform_submit_button_16" class="gform_button button" value="Submit"
onclick="if(window["gf_submitting_16"]){return false;} if( !jQuery("#gform_16")[0].checkValidity || jQuery("#gform_16")[0].checkValidity()){window["gf_submitting_16"]=true;} "
onkeypress="if( event.keyCode == 13 ){ if(window["gf_submitting_16"]){return false;} if( !jQuery("#gform_16")[0].checkValidity || jQuery("#gform_16")[0].checkValidity()){window["gf_submitting_16"]=true;} jQuery("#gform_16").trigger("submit",[true]); }">
</div> <input type="hidden" name="gform_ajax" value="form_id=16&title=&description=&tabindex=0">
<input type="hidden" class="gform_hidden" name="is_submit_16" value="1">
<input type="hidden" class="gform_hidden" name="gform_submit" value="16">
<input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
<input type="hidden" class="gform_hidden" name="state_16" value="WyJbXSIsIjcwMDM2YTJiY2IyNzYzYzM2Y2Y3OTU2ZmMwYjU2OTMzIl0=">
<input type="hidden" class="gform_hidden" name="gform_target_page_number_16" id="gform_target_page_number_16" value="0">
<input type="hidden" class="gform_hidden" name="gform_source_page_number_16" id="gform_source_page_number_16" value="1">
<input type="hidden" name="gform_field_values" value="">
</div>
<p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js" name="ak_js" value="1634494191195">
<script>
document.getElementById("ak_js").setAttribute("value", (new Date()).getTime());
</script>
</p>
</form>
Text Content
* Company * About * Case Studies * Solutions * Dark Web Monitoring * Fraud Investigations * Account Takeover Solutions * Counterintelligence * Services * IT Audit & Security Risk Assessment * Cyber Risk Management * Penetration Testing * Computer Forensics * Emergency Incident Response * Malware Detection & Removal * Blog * Contact * Contact * 844-HACK-911 SPECIALIZED CYBER RISK MANAGEMENT & INVESTIGATIONS Bespoke Cybersecurity Solutions Designed to Minimize and Mitigate Fraud. Find Out More OUR PROFESSIONAL CYBERSECURITY SOLUTIONS INCLUDE PRE AND POST-BREACH SOLUTIONS DESIGNED TO HELP MITIGATE AND MINIMIZE EXPOSURE TO YOUR ORGANIZATION. OUR EXPERTISE INCLUDES SECURITY RISK ASSESSMENT We assess your company’s risk and threat levels, and then develop a comprehensive counter measure and prevention plan to protect your assets. NETWORK SECURITY AUDITS Examine internal and external networks for vulnerabilities which could be exploited to compromise systems or gain access to sensitive information. WEBSITE SECURITY AUDITS Manual testing for vulnerabilities in your web application(s), including debugging code and removing leftover sources, resource files, and data. PENETRATION TESTING Simulating an attack from a hacker’s perspective to identify critical flaws in your network that could potentially leave sensitive data open to attacks. DIGITAL FORENSICS We offer remote or on-site analysis of websites, servers, digital media and computer systems, tailored to St. Louis business needs and legal requirements. EMERGENCY SUPPORT Our 24/7 Incident Response Team discretely identifies and eliminates exposure points so your business can resume operation as quickly as possible. In 60% of cases attackers are able to compromise an organization within minutes 99.9% of systems were compromised more than a year after the exploited vulnerability was published 10 vulnerabilities account for almost 97% of all exploits observed IN THE MEDIA Bloomberg interview with Founder Vinny Troia HAVE QUESTIONS? WE ARE READY TO SCHEDULE YOUR FREE CONSULTATION Contact Us Today 24/7 DARK WEB MONITORING ACCOUNT TAKEOVER PROTECTION AUTOMATED THREAT ACTOR ANALYSIS AND DISCOVERY Learn More CODE OF ETHICS Not all hackers wear a black hat. Founder Vinny Troia is the person you want investigating your company on the Dark Web, or walking you through the aftermath of a cyberattack. Troia has been at the forefront of cybersecurity research and investigations, and is credited with the discovery of some of the world’s most massive data breaches. Contact Us CYBERSECURITY BLOG The latest news and insights into the world of cybersecurity ASTORIA COMPANY DATA BREACH RESEARCH AND ANALYSIS Read More THE DATA VIPER HACK: ENGINEERING A HONEYPOT TO CATCH CYBER CRIMINALS Read More AN INFOGRAPHIC TIMELINE OF THEDARKOVERLORD & SHINYHUNTERS Read More THE UNDERGROUND CYBERCRIME ECONOMY OF HACKED FORTNITE AND GAMING ACCOUNTS Read More CONTACT US * 314-669-6569 * 844-HACK-911 * info [at] nightlion [dot] com * Name* * Company * Email* * Phone * Confidential Message* * * * * Δ Copyright © 2021 Night Lion Security, LLC slide show Experienced a Breach? NEED IMMEDIATE ASSISTANCE? Our emergency incident respose team is available 24/7. Call Us: 844-HACK-911 Copy link CopyCopied Powered by Social Snap Notifications