Hudson Rock specializes in sourcing compromised credentials from threat actors. The data is continuously augmented at a rate of 100,000+ compromised computers worldwide, every month. The result is a unique cybercrime intelligence data source composed of millions of machines compromised in global malware spreading campaigns, currently featuring: 5M+ compromised machines, 900K+ compromised employees and 130K+ compromised companies.
Hudson Rock’s boots-on-the-ground approach to cybercrime intelligence is rooted in the team’s backgrounds in the IDF's prestigious 8200 Cyber Unit, where Alon Gal, Hudson Rock's CTO, pioneered cybercrime intelligence activities and forensic technologies against nation-state adversaries.
We offer two key products:
Bayonet makes it incredibly easy and effective to access hundreds of thousands of compromised companies around the world with active vulnerabilities that can be converted into customers. Key to Bayonet is the ability to search for Prospects by: Geography, Industry, Company Size, URL, and Infrastructure. For example, MSSP sales professionals can search for Accounting firms, 100-300 employees in size, in the United States.
Credits are used to unmask company specific data that can be used to bolster sales outreach activities, for example the details of employees with compromised corporate VPN credentials.
Bayonet is Hudson Rock’s second product after ‘Cavalier,’ the industry's most robust data source for compromised credentials of employees, partners, customers, and digital assets. With Cavalier’s high-fidelity data, security professionals get unprecedented granularity of threat vectors including Ransomware, Business Espionage, Breaches & Network Overtakes.
Founded in 2020, Hudson Rock is trusted by security & threat Intelligence teams, cyber-insurance providers, 3rd party risk assessment providers and MSSPs. The company’s clients include the likes of Rapid7, Panorays, Cyrus, Kovvr, Teramind and TÜV Rheinland.
It’s no coincidence then that our product got listed as one of the best threat intelligence solutions! Needless to say, we are grateful for cybernews.com publication, breaking the latest news on topics like best antivirus software and many more.
In this second of a three part series, presented in collaboration with Cyrus, we dive into botnets & info-stealers.