SERVICES

Thesaurus

The service aims at offering a representation of the  Cybersecurity domain through the creation of a controlled...

DGA detection

The service analyzes a DNS request log and detects if there are domain names which can be generated by a Domain...

Tweets analysis

This service shows statistics related to Tweets related to Cyber-Security, allowing to search them by keywords such as...

GDPR tools

The service offers a survey to check the compliance of an organization with the GDPR (General Data Protection...

Onthology

An onthology represents an important resource for the organisation of a domain's knowledge in a more detailed way by...

Antimalware

The service detects malicious signatures in analysed files, by scanning it with 57 different commercial anti-malware....

Spam email detection

This service analyses sets of email file in .eml format to identify the unsolicited ones (SPAM). Moreover, the service...

Vulnerability report

This service offers the possibility of searching public domain information related to known security hardware and...

3D maps attack

The service shows a 3D representation of network traffic related to attacks on a honeypot in Pisa. In addition, the...

Vulnerability scan

The service offers a platform that allows Registrars to check for any performance and security problems present on...

Exploit analysis

This service collects data related to public available exploits. The database is updated daily through the official...

Ransomware detection

This service identifies typical ransomware behaviours such as file ciphering. Differently from signature-based anti-...

Self assessment tools

The main goal of the tool is to provide a simple and quick tool for cyber risk self-assessment. The tool requires two...