Automated statistical analysis to identify outliers and noticeable variances. Analysis of field patterns allow us to model, correlate and classify behaviors.
Our solution includes a visual display of comprehensively collected rich meta data across non-indexed file-sharing networks including IP Address/URL, timestamp, hash, spread metrics, infection type, user agent, port, source, exposed files and more.
Automated similarity factoring methodology to provide advance detection of illicit behaviors and offenders.
Detect and identify malware distributors and victims by pinpointing source location, file type and temporal shifts.
We track and collect thousands of instances every day including known exploits and potential C&C, ransomware, and possible zero-day malware threats.
We have downloaded malicious files months prior to their identification by leading anti-virus software as malware.
Our automated feed is built to support industry standard delivery methods such as TAXII and STIX schemas.
Developing a better understanding of malware inside the Deep Web means a better product offering and a safer internet for our customers. Tiversa asks those lurking in the Deep and Dark web, areas riddled with malware, to give us all they have. They oblige. Tiversa downloads on average 11,000 infected files per day, coming from over 6,000 unique IP addresses. These are files being shared by users within the Deep Web, including Dark Web and Peer-to-Peer file-sharing networks. These are files that can easily pass onto innocent networks and cause harm.
Help protect a company or client's network by receiving a malware feed identifying potential attacks providing an added layer of security.
Tiversa's ability to download malware located on the Deep Web provides the opportunity to enhance existing feeds providing a stronger defense. Our data is unique because of the sources we collect. Threat intelligence providers can enrich their offering with our unique source of data.
Organizations can provide their IP addresses to scan for potential malware being distributed from their IP range. Additionally, large corporations can input keywords to monitor for files containing malware that may include any brand-related keyword. This could counteract targeted malware and phishing campaigns, as cybercriminals may attempt to dangle an infection in a corporate document.
Understand the behaviors and patters of malicious code within a unique data set and internet protocol.