SERVICES

3D maps attack

The service shows a 3D representation of network traffic related to attacks on a honeypot in Pisa. In addition, the...

Exploit analysis

This service collects data related to public available exploits. The database is updated daily through the official...

Antimalware

The service detects malicious signatures in analysed files, by scanning it with 57 different commercial anti-malware....

Tweets analysis

This service shows statistics related to Tweets related to Cyber-Security, allowing to search them by keywords such as...

Onthology

An onthology represents an important resource for the organisation of a domain's knowledge in a more detailed way by...

Spam email detection

This service analyses sets of email file in .eml format to identify the unsolicited ones (SPAM). Moreover, the service...

Vulnerability report

This service offers the possibility of searching public domain information related to known security hardware and...

DGA detection

The service analyzes a DNS request log and detects if there are domain names which can be generated by a Domain...

Vulnerability scan

The service offers a platform that allows Registrars to check for any performance and security problems present on...

Thesaurus

The service aims at offering a representation of the  Cybersecurity domain through the creation of a controlled...

Ransomware detection

This service identifies typical ransomware behaviours such as file ciphering. Differently from signature-based anti-...

Self assessment tools

The main goal of the tool is to provide a simple and quick tool for cyber risk self-assessment. The tool requires two...

GDPR tools

The service offers a survey to check the compliance of an organization with the GDPR (General Data Protection...