www.hudsonrock.com
Open in
urlscan Pro
34.249.200.254
Public Scan
Submitted URL: https://www.hudsonrock.com/blog/snowflake-massive-breach-access-through-infostealer-infection
Effective URL: https://www.hudsonrock.com/
Submission: On June 03 via api from TR — Scanned from DE
Effective URL: https://www.hudsonrock.com/
Submission: On June 03 via api from TR — Scanned from DE
Form analysis
2 forms found in the DOM/search
<form action="/search" id="domain-form" class="apk-form w-form"><input class="compromised-form-field w-input" maxlength="256" name="query" placeholder="Search now... Enter your domain." type="search" id="search-domain" required=""><input
type="submit" class="submit-button w-button" value=""></form>
/search
<form action="/search" id="email-form" class="apk-form w-form"><input class="compromised-form-field w-input" maxlength="256" name="query" placeholder="Search now... Enter your email." type="search" id="search-email" required=""><input type="submit"
class="submit-button w-button" value=""></form>
Text Content
This website uses cookies. Learn More Products CavalierBayonetUse Cases APIFree ToolsContact About Us Partner with UsCompanyBlogBlog Customer Login Schedule a Demo Customer Login Schedule a Demo HUDSON ROCK’S PRODUCTS — CAVALIER & BAYONET — ARE POWERED BY OUR CONTINUOUSLY AUGMENTED CYBERCRIME DATABASE, COMPOSED OF MILLIONS OF MACHINES COMPROMISED BY INFOSTEALERS IN GLOBAL MALWARE SPREADING CAMPAIGNS. Our high-fidelity data is sourced directly from threat actors — not from database leaks. 27,903,934 Compromised Machines 3,932,099 Compromised Employees THE HUDSON ROCK API A Robust Cybercrime Intelligence Feed: * End-User Protection * Infrastructure Protection * Supply Chain Risk Assessment * Assets Discovery Try Our Free Preview API Today TRUSTED BY SECURITY & PRODUCT TEAMS AT LEADING COMPANIES. Read Customer Use Cases IS YOUR COMPANY OR SUPPLY CHAIN COMPROMISED? HAS YOUR EMAIL BEEN COMPROMISED? HUDSON ROCK IS TRUSTED BY: * Security & Threat Intelligence Teams * Cyber-Insurance Providers * 3rd Party Risk Assessment Providers * MSSPs * Governmental Agencies Schedule a Demo CAVALIER™ — FOR THREAT INTELLIGENCE PROFESSIONALS Are you a security professional charged with bolstering platform integrity and defending against Account Take Over (ATO), Ransomware Attacks & Corporate Espionage? With Cavalier™ you will be immediately notified about Compromised Credentials belonging to your Employees, Customers, Users & Vendors. CAVALIER™ INCLUDES: * Compromised Employees * Compromised Customers & Users * Compromised Supply Chain * Compromised Android Users * Compromised Leaked Database * Compromised CXO’s & Family Members Schedule a DemoEXPLORE CAVALIER™ BAYONET™ — FOR CYBERSECURITY SALES TEAMS & MSSPS Are you a sales professional selling products and services in the cybersecurity space looking for more leads and prospects? With Bayonet™ you get access to hundreds of thousands of compromised companies around the world with active vulnerabilities that you can convert into customers. BAYONET™ INCLUDES: * Search for Prospects by Name * Search by Geography * Search by Industry * Search for Prospects by Login Infrastructure * Granular Supply Chain Risk Assessments * Compromised Credentials * Discover Technologies Used by Prospects Schedule a DemoEXPLORE BAYONET™ IN THE PRESS: USERS OF CYBERCRIME FORUMS OFTEN FALL VICTIM TO INFO-STEALERS, RESEARCHERS FIND "After analyzing millions of computers infected with info-stealing malware, researchers at cybersecurity firm Hudson Rock said they identified 120,000 that contained credentials used for logging into cybercrime forums." August 16, 2023 CYBERSECURITY FIRM LINKS PIERS MORGAN TWITTER HACK TO LEAK OF 400M RECORDS "Israeli cyber-intelligence firm Hudson Rock appeared to be the first to notice the posting offering the data of 400 million Twitter users, tweeting about the “credible threat” three days ago." January 1, 2023 533 MILLION FACEBOOK USERS' PHONE NUMBERS AND PERSONAL DATA HAVE BEEN LEAKED ONLINE "A database of that size containing the private information such as phone numbers of a lot of Facebook's users would certainly lead to bad actors taking advantage of the data to perform social-engineering attacks [or] hacking attempts," Gal told Insider. April 1, 2021 T-MOBILE HACK IS A RETURN TO THE ROOTS OF CYBERCRIME “In the case of the T-Mobile attack, the alleged hacker said they had different motivations. In a screenshot of a text conversation posted online by Alon Gal, co-founder of cybercrime firm Hudson Rock, the hacker appears to tell Gal that the attack was done “to harm US infrastructure.” March 1, 2021 Hudson Rock ™ | Terms of Service | Privacy Statement By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookies Settings Reject All Accept All Cookies PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices