

SERVICES
-
Threat
IntelligenceTI quickly detects various leak information by reviewing and analyzing DDW threat data and protects customers from external threats.
-
Digital Abuse
IntelligenceDI analyzes brand/digital abuse occurring by studying transaction data on digital platforms and detects abnormal transaction users.
-
Virtual Asset
IntelligenceVI with AI-based detection technology, conducts in-depth analysis of virtual asset transactions and monitor illegal transactions.
INTELLIGENCE
@S2W
01 | 00
-
It's an honor to be nominated as the top 10 cybersecurity startups in Korea
Korean startups in the cybersecurity sector have been coming out with products and services for many years now. The demand now is higher than ever before and you can see this in the fact that South Korea has a major shortage of experienced cybersecurity professionals to fill open positions.
-
S2W's new CTI solution Quaxar will be launching!
S2W's CTI solution, beyond protecting the corporate’s core assets, Quaxar helps you to make better decisions for sustainable growth of your business.
-
NLP research paper regarding the dark web has now been accepted at NAACL 2022
We are thrilled to announce that our research paper (collaboration with KAIST) regarding the dark web has now been officially accepted at NAACL 2022!
-
Rising Stealer in Q1 2022: BlackGuard Stealer
BlackGuard Stealer, which collects and exfiltrates credentials and device information from infected PC, first appeared when the official seller posted a promotion article on the dark web forum in January 2022
-
Leveling up your cyber threat intelligence team with Quaxar
Quaxar is designed to empower your teams to detect external threats by covering dark/deep web.
-
Footsteps of the LAPSUS$ hacking group
The LAPSUS$ hacking group is estimated to have started at least on May 15, 2021, and they are not RaaS and have been identified as attack groups specializing in data theft.
-
Deep Analysis of Redline Stealer: Leaked Credential with WCF
Redline Stealer, which is currently being distributed, has changed the C2 communication method and the way of delivering the collected information, but the overall execution flow is the same.
-
Quaxar, the brightest beacon in the Universe
Quaxar is built upon the core foundations of Xarvis Enterprise and is determined to illuminate threats in the dark.
-
Tracking SugarLocker ransomware & operator
Gustavedore, who operates the SugarLocker ransomware, started RaaS activities and is looking for partners.