Through the DarkNet component, CyberSANE is able to identify compromised assets or information by monitoring and analysing Dark Web communities. This enables security professionals and experts to identify attacks before they even happen, providing them with the opportunity to manage and close vulnerabilities in their organizational infrastructure, or even strengthen technical controls pre-emptively.

DarkNet allows the exploitation and analysis of security, risks and threats related information, embedded in the User Generated Content (UGC), via the analysis of both the textual and meta-data content available from various electronic streams.


JSI‘s EventRegistry system is able to monitor and aggregate knowledge that is currently spread across mainstream and social media, and to enable cross-lingual services for publishers, media monitoring and business intelligence.

Through the collection, analysis and visualisation of unstructured date, including media articles and blog posts, this tool helps to get the big picture of global cybercrime and cybersecurity activities which is useful for the investigation of identified incidents and threats.


The MEDUSA Cyber Intelligence suite by Ubitech constitutes a sophisticated, modular, highly -configurable and -scalable web mining and intelligence platform that benefits from Artificial Intelligence and Big Data technologies to provide intelligence and real-time insights to non-IT domain experts, satisfying the multi-disciplinary needs of end-user organizations that require advanced web crawling, processing and analytics services.

Its main features are:

  • Scalable web crawling
  • Multi-level processing pipeline
  • Evidence collection
  • Intuitive analytics
  • Built-In AI support and trained models
  • Integrated network tools
  • Multi-modal alerting
  • Reporting
  • Interoperability with third-party tools

MEDUSA serves the DarkWeb Layer as a core component for crawling and curating texts from the dark web also feeding the ShareNet Layer to raise awareness about cyber incidents to end users.

Comments are closed.