Home Threat Intelligence | Identification of information security threats

Threat Intelligence | Identification of information security threats

In 2016, hackers stole information from more than 57 million Uber customers. This has caused significant damage to reputation and finances. This was followed by a thorough analysis of the company’s information security threats. It is desirable to carry out this procedure regularly to each enterprise which keeps the data of the clients and does not wish to lose money

The information security system is a structure for preventing the occurrence of unauthorized transactions with data, in particular, it allows you to detect incidents. The task of information security is the comprehensive protection of company information, which does not harm its productivity. It is regulated by special documents and norms


Types of information security threats

Factors with conditions that negatively affect information security are called threats. One of the most useful parameters for the classification of threats is the division by the direction of the danger on any aspect of security. There are the following main threats to information security:

  • privacy. Represents illegal access to information by a person who does not have the necessary level of access to it
  • availability. It occurs when access to elements of an information system becomes difficult or inaccessible
  • integrity. Occurs when a third party gains access to the data change

These threats are caused by the human factor, as well as hardware or software failures

Want to know more?

Get a consultation

Internal and external IS system threats are detected through the implementation of the FS TI

FS TI is a software product that contains a list of anonymized IP addresses in the TOR, PROXY & VPN categories, which are sold both in public space and in DarkNet. This product allows you to identify anomalies in network traffic, application traffic and can be used in a variety of ways. The information is available in many formats. However, the product is integrated into a large number of different systems


The number of ways to illegally access IS systems and, consequently, threats, is constantly increasing, so every entrepreneur should think about their own security system and possible threats




More than 30 million IP addresses are monitored, more than 300,000 active IPs are issued daily with a high probability of attacks. The information is updated daily, now it appears in the cyber community in 2-6 weeks



Additional proactive tool for traffic analysis, data based decision making and incident prevention



FS TI data is available via feed in TXT, STIX, JSON formats, they can be downloaded via API. Assistance in integration in SIEM, SOAR, Firewall-systems, and also in other information security systems

Related products and services


Simulator of sending phishing emails in order to understand the probability of a successful phishing attack on the company and plan activities to increase the level of education of employees to counter phishing attacks

• Integration within the corporate network
• Development of phishing pages for your requirements
• User texts in emails
• Setting up the system for a mail server



WEB-solution that helps to verify employees and contractors on data from open and closed sources, as well as with Big Data FS Group

You get access to unique data, make it easier for employees of different departments, for example:

• purchasers
• HR
• compliance officers
• lawyers
• financiers

and among other things - you get a centralization and a single point of entry of data, which can work with different departments of the organization



Package of services for investigation, analysis and investigation of information security incidents

The minimum package includes:
• consulting with experts
• investigation of the IS incident
• comprehensive forensic examination of digital evidence
• reports on individuals / legal entities from open and closed sources
• a monthly newsletter with information about vulnerabilities actively used by hackers and recommendations for increasing the level of protection
• penetration testing
• scanning web applications and resources



Software product for detecting compromised accounts of the organization in open and closed sources

Thanks to FS MNG you can:

• identify compromised accounts, including when compromising third party resources
• prevent data leakage
• protect against the use of compromised passwords
• be informed about the leaks before it is widely covered in the media



A software product that contains a list of anonymized IP addresses in the TOR, PROXY & VPN categories sold in public and in DarkNet. Allows you to identify anomalies in network traffic, application traffic and can be used in various ways

• Proactive approach to TI collection
• More information for decision making
• Earlier provision of data and thus prevention of attack
• Compatibility with most vendors' solutions
• Complementarity with other feeds


Like many other companies, FSG uses cookie technology on its websites to improve your user experience, as well as for the correct operation of the website.

If you agree to the use of all cookies on this site, click the Ok button. To learn more about cookie technology, its benefits and how FSG uses it, check out our Privacy Policy.