Social Links founded in 2015. Company possesses unique expertise in developing and maintaining methods for Open Source, Social Media and Dark Net data gathering. We have additional expertise in the areas of face recognition, object detection, machine learning, data analysis and visualisation .
We offer a number of products to the market, such as: on-premise solutions, API requests, the Social Links plugins for Maltego.
Cyber Security Training
Cyber Security Training is a formal process for educating individuals, whether that be students or employees, about computer security and information security. This training can be in the format of a security awareness program or a certification. Cyber Security Training covers, but not exclusively, these elements: current threats, attack flags, defensive procedures, and threat reaction plans.
Digital Forensics
When traditional information sources are unable to retrieve the desired data needed to progress your investigation. When you have an abundance of open cases that need immediate attention. When there is no time to learn OSINT coding. When you have limited manpower to conduct in-depth investigations. Social Links PRO is an Open source, Social media and Darknet data mining add-on for Maltego Classic/XL which is a time tested instrument for intelligence and investigations that is used by governmental bodies and private companies across the world.
Digital Security
Digital Security refers to various ways of protecting computer's internet account and files from intrusion by an outside user.
Penetration Testing
A method for gaining assurance in the security of an IT system by attempting to breach some or all of that system's security, using the same tools and techniques as an adversary might.
Risk Management
Risk management is the identification, evaluation, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.
Security Intelligence
Security intelligence (SI) is the information relevant to protecting an organization from external and inside threats as well as the processes, policies and tools designed to gather and analyze that information.
Intelligence, in this context, is actionable information that provides an organization with decision support and possibly a strategic advantage. SI is a comprehensive approach that integrates multiple processes and practices designed to protect the organization.
Social Engineering
Social engineering is a form of techniques employed by cybercriminals designed to lure unsuspecting users into sending them their confidential data, infecting their computers with malware or opening links to infected sites.
Threat Intelligence
DarkNet is a space where familiar OSINT tools are difficult and sometimes even impossible to use. Maltego's built-in search methods focus mainly on the public Internet and do not solve the problem of surrounding the need for complex queries to access DarkNet resources. Collecting data manually usually turns out to be difficult, inconvenient, and time consuming task. This obstacle is successfully overcome by Social Links. The tool developed is integrated with 30+ DarkNet search engines, marketplaces and forums, making full-text search by posts and product descriptions, search by an alias, Telegram accounts, Jabber, ICQ, phone numbers, PGP keys and email possible.
Threat Protection
A Threat is something that could cause harm to a system or organization. Threat Protection can come in different fields and specializations such as Threat analysis, Threat assessment and Threat monitoring.
Vulnerability Management
Vulnerability assessment refers to the process of identifying risks and vulnerabilities in computer networks, systems, hardware, applications, and other parts of the IT ecosystem. Vulnerability assessments provide security teams and other stakeholders with the information they need to analyze and prioritize risks for potential remediation in the proper context.