The tool is used by government and other public agencies, financial, enterprise and healthcare organistions, and many others. Hunter builds upon the product formerly known as IDHunt Core, and it provides new features specifically requested by customers to speed investigations of threat actors.
The upgraded features include:
Comprehensive, intuitive visualisations – Visualise collected data in a controlled workspace to identify links and conduct network analysis for a complete investigative picture.
New sources – Correlate and enrich data from Constella's proprietary breach data lake, Paste bins, Passive DNS, WHOIS domain history, cryptocurrency, social profiles, standard search engines, Dark Web forums, and other sources.
Fluid investigation management – Create, save, and share multiple investigations with colleagues for collaborative working.
Every day we send out a free e-mail with the most important headlines of the last 24 hours.
Subscribe now
We welcome comments that add value to the discussion. We attempt to block comments that use offensive language or appear to be spam, and our editors frequently review the comments to ensure they are appropriate. If you see a comment that you believe is inappropriate to the discussion, you can bring it to our attention by using the report abuse links. As the comments are written and submitted by visitors of the Telecompaper website, they in no way represent the opinion of Telecompaper.