Project Description

We protect companies from impending Ransomware & Breach incidents with high fidelity cybercrime intelligence.

Company Profile

Based on cybercrime intelligence and forensic technologies developed at Israel's renowned 8200 Cyber Unit, Hudson Rock helps organizations prevent disasters by protecting them from threat actors' impending Ransomware attacks and data breaches.

How will the product/service, assist orgenizations dealing with current cyber threats?

Companies today are exposed to tremendous risks such as ransomware attacks and data breach incidents. We are able to mitigate a commonly used attack vector that helps cybercriminals perform ransomware attacks and data breaches. With Cavalier, Hudson Rock continuously notifies Network Security teams of compromised Employee, Partner, and User credentials. Our boots-on-the-ground approach to cyber-criminal threats is rooted in our backgrounds in the IDF's prestigious 8200 Cyber Unit, where we specialized and developed cybercrime intelligence and forensic technologies against nation-state adversaries.

Technical description of the product/service

Hudson Rock’s Cavalier helps prevent credential-based ransomware attacks and data breaches before they occur -- vectors widely used by cybercrime threat actors. These cybercrime groups take advantage of computers infected in worldwide malware campaigns. Valuable data is extracted from these machines, then sold in criminal darkweb transactions, in order to gain network access of corporations of all sizes. Hudson Rock continuously acquires this data as well. It’s important to note that the data we acquire through various means and methods is not commonly available, nor part of known data dumps. Rather, the data we acquire is from rather exclusive sources and transacted for the expressed purpose of carrying out ransomware attacks and data breaches. Cavalier is offered as a service. We continuously augment our data and monitor for breached credentials belonging to our clients’ employees, partners and customers. The on-boarding process is simple, consisting of two parts: 1) Provide Hudson Rock with a list of networks accessed regularly by credentialed users, and 2) Defining how Hudson Rock should notify the Network Security team. Once initiated, we immediately notify our clients of breached credentials so they can reset or terminate them before they are compromised by a threat actor.
For more information, contact us

Can’t find your challenge here?
Add your own challenge and find relevant Israeli Cyber companies.

What is your challenge?