The name of the base system (platform): | Artificial intelligence (AI, Artificial intelligence, AI) |
Developers: | Future Crew (MTS Innovation Center) |
Date of the premiere of the system: | 2023/03/30 |
Last Release Date: | 2024/12/05 |
Technology: | Information security - Firewalls, information security - Information leakage prevention, information security - Information and event management in the security system (SIEM), information security - IT risk management - Digital Risk Protection (DRP) |
Main article:
Cicada8 ETM (External Threat Management) is a digital threat management platform.
2024: Add Brand Protection Module
The Future Crew Innovation Center, part of MTS PJSC, on December 5, 2024 announced the update of the ETM CICADA8 platform. The Vulnerability and Digital Threat Management Platform CICADA8 ETM helps companies monitor the current level of external perimeter security in real time, monitor IT assets in dynamics, combat shadow assets, and control the security of the digital perimeter. Now the platform has a brand protection module, which includes searching and blocking phishing, monitoring leaks and negative cases in the media and social networks.
The Antifishing direction allows you to search and block phishing sites for 1000 + domain zones and identify pages that imitate the company's brand. The platform not only detects dangerous resources, but also monitors upcoming phishing campaigns. Proprietary development using machine learning to recognize and classify phishing resources makes the process even more efficient.
In the direction of "Leakage," a search is carried out for leaks of confidential information both in open and closed sources: in public databases, private chats and forums, on shadow resources. In addition, the platform has tools for validating sensitive information that can find links between leaks and company employees.
The CICADA8 ETM platform now also tracks negative mentions in the media and social media. The "Protection in the Media" direction helps to identify black PR campaigns and analyze the tone of brand mention, which allows you to respond in a timely manner and minimize possible risks. With the help of "Protection in the Media," companies can also monitor the tone of publications about a particular person - for example, from among top managers.
The company estimates the volume of the vulnerability management market in the Russian Federation available by 2026 at 8 billion rubles. By 2026, ETM CICADA8 plans to earn 1.2 billion rubles.
It was important for us that the CICADA8 ETM platform allow us to build an individual business process for managing vulnerabilities, and we implemented this. The main array of attacks on companies is carried out using vulnerabilities, phishing and information leaks. We've combined threat data into one platform, and now we've added reputational risk management to that through media and social media mentions. All tracked metrics are displayed on a single dashboard that can be configured on demand, which provides full visibility of all external digital threats, "CICADA8 Aleksei Kuznetsov told CTO. |
2023: Issue of Cicada8
On March 30, 2023, the MTS RED Future Crew Innovation Center announced the release of the Cicada8 platform for continuous comprehensive control of the security of organizations using artificial intelligence.
According to the company, the solution is based on an integrated approach to security control: Cicada8 not only allows you to control the vulnerability of external infrastructure to cyber attacks, but also monitors the appearance in the media, Telegram and the darknet of publications about cybersecurity incidents at the customer, such as leaks or hacking. This provides companies with the ability to proactively optimize their security and respond quickly to possible cyber attacks.
The solution continuously analyzes the external IT perimeter of organizations, identifies "blind spots" in protection and identifies open vulnerabilities. To form a list of auditable vulnerabilities, company experts use both public sources and shadow resources of the darknet. The platform uses modern cybersecurity technologies, including those based on artificial intelligence.
All results of the analysis are verified by company experts who have international certificates in the field of information protection. Based on the results of the audit, they form reports on the identified cybersecurity problems and recommendations for their elimination. This reduces the number of false positives to zero and allows companies' information security services to fix security gaps. told Alexey Kuznetsov, technical head of the Cicada8. |
In 2022, information appeared every month about more than 2,500 vulnerabilities, which were then used by attackers to carry out mass or targeted attacks aimed at a specific company. At the same time, the average lifetime of a vulnerability on the perimeter of organizations is about 45 days. The standard method of solving this problem is to conduct regular penetration tests. The Cicada8 platform provides continuous testing. This ensures that business knowledge of the level of protection against possible cyber attacks is constantly relevant. In addition, the minimum period required to identify current cyber threats using standard penetration testing averages eight weeks. Using Cicada8 for this purpose will reduce this period to one week.
At the same time, the Cicada8 is also more optimal compared to automatic vulnerability scanners due to the fact that it not only checks the security of the well-known external infrastructure of companies, but also detects the entire possible surface of the attack, including those workstations, servers and systems that have not yet come under the control of information security services.
All audit results are available to customers in a closed personal account on the portal, where they can track changes in the external infrastructure, learn about vulnerabilities, monitor the status of their elimination and generate reports for top management and regulators. Companies with geographically distributed infrastructure can also monitor the level of security of subsidiary assets and branches in a single personal account.