Dark Web Scanning Software to detect Sony Hack; Terbium Labs shows how via Matchlight

By

Sony seems to find an ally in its battle against malware attack via Terabium Labs newest malware scanning product, the Matchlight. This Dark Web scanning software is designed to detect Sony hack and locate lost data on the dark web in an instant.

The Next Web News posted to its Twitter account today its recently published article on this data intelligence system which its developers claimed to have the capability to instantly detect "stolen data on the dark web as soon as it appears," including in more publicly accessible sites and forums.

To be able to do that instantaneous detection, Terbium Labs CEO Danny Rogers explained that Matchlight uses computer speed in reading the Internet. Rogers explained that, while all dark web markets are accessible, there's no way for human analysts to be able to keep track on the expansion of their services, and that's where the system comes in.

Rogers proved his claim by citing one of the results from its beta testing program. According to him, "Our system identified about 3,000 of its credit card numbers appearing on a dark Web marketplace within about 30 seconds of that leak. That allowed it to know which accounts were compromised before any fraudulent transactions occurred."

Terbium has been doing the private beta testing program for its dark web scanning software since January with five Fortune 500 and Fortune 5000 companies. Starting today the company is opening this program to other companies.

Indeed, could Sony have avoided the epic hack which used famous malware available from the black market last year if it were using Matchlight, like what Rogers is claiming? That remains to be seen, but the good thing is, this makes it clear that building up your defences will never be enough.

If Matchlight can be that dark web scanning software that Sony needs for strengthening its defense against information theft, tracking the location of stolen data will be so much easier and will be done in no time after the hack has been made. That's not to mention instant detection of a malware attack, and minimize undesirable effects too.

© 2024 VCPOST.com All rights reserved. Do not reproduce without permission.

Join the Conversation

Real Time Analytics