The Industry's Most Robust Compromised Credentials Data Source
"Remarkable high-fidelity data granularity."
Cavalier™ is based on forensic technologies and operational knowhow developed at the IDF's 8200 Unit to counter nation-state adversaries and professional threat-actors. It is a unique cybercrime intelligence data source composed of millions of machines compromised in global malware spreading campaigns.
Our high-fidelity data is sourced directly from threat actors and augmented monthly with hundreds of thousands of new compromised machines. Cavalier's™ high-fidelity data protects employees, partners, customers, and digital assets with unprecedented granularity of threat vectors including Ransomware, Business Espionage, Breaches & Network Overtakes.
Download Resources
Get detailed insights into Cavalier's capabilities with our comprehensive resources.
Brand Protection
Comprehensive protection to your brand from cybercrime threats and compromised credentials.
Data Enrichment
Learn how Cavalier's threat intelligence data can enrich your security operations and investigations.
Cavalier™ is Available for:
Data Spans these Sectors:
Cavalier™ Data:
- Compromised Employees
- Compromised Customers & Users
- Compromised Vendors
- Compromised Android Users
- Compromised Leaked Databases
- Compromised CXO's & Family Members
Access Methods:
- Web
- API
- JSON
- Custom
Integration Options:
- SIEM
- SOAR
- EDR
Cavalier™ Data Includes:
Allows hackers to use existing sessions of victims by importing their cookies and bypass 2fa and other security measurements.
The IP address of the compromised computer.
The date in which the computer was infected.
The username of the computer that was infected assists in identifying which computer was infected as sometimes employees share credentials, complicating attribution.
Advanced AI-powered analysis of infostealer behavior patterns, attack vectors, and malware family classification to provide deeper insights into the infection methodology.
Comprehensive analysis of victim's browsing patterns, visited websites, and online behavior that may have led to the compromise or reveals sensitive information.
URL accessed by the victim, their login credentials and plaintext passwords, are used by hackers to hack into employee and user accounts. The credentials are retrieved directly from the browsers of the victims and are therefore almost always valid.
The path on the computer in which the infostealer malware was installed on.
Which operating system was installed on the infected computer.
A list of the anti-viruses running on the computer at the time of the infection.
Detailed forensic analysis identifying the root cause of infection, including entry points, vulnerable applications, and attack chain reconstruction.
Sensitive files that were stolen from the computer at the time of the infection, including documents, credentials, and other critical data.