Pentiq
Intelligence & Advisory

Threat Landscape Discovery

Before any attacker buys an exploit, they Google. Pentiq runs OSINT and dark-web reconnaissance across DNS, breach lists, paste sites, typosquats, and brand-impersonation chatter - so you find out what's out there before someone with worse intentions does.

Try a free version first

The OSINT Preview runs three public-record lookups against a single domain - free, in your browser, no obligation. A taster of what the full engagement uncovers.

Run OSINT Preview ->

What we test

What's already public about your organisation, leaked, or for sale?

Public and semi-public data sources (DNS, WHOIS, social media, paste sites), credential leak databases, dark-web and underground-forum chatter for brand and executive mentions, and lookalike-domain registrations that suggest an upcoming campaign.

Why it matters

The pressure this service answers.

Credentials leaked in an unrelated breach become your next phishing campaign. Knowing what's already public is the cheapest defensive control there is.

Findings from this engagement commonly support evidence for DORA Article 25 and NIS2 Article 21.2.e.

Testing activities

Manual, reproducible, peer-reviewed.

Every engagement is scoped through a formal Rules of Engagement, delivered by an in-house Pentiq consultant, peer-reviewed by a senior tester, and risk-rated using CVSS 4.0 where applicable.

  • Collection of public and semi-public data sources (DNS, WHOIS, social media, paste sites)
  • Credential-leak analysis and breach-list correlation
  • Dark-web and underground-forum monitoring for brand or executive mentions
  • Detection of typosquat and lookalike domains
  • Attribution assessment of potential threat actors and campaigns
  • Intelligence-report delivery with priority remediation actions and monitoring recommendations

Methodologies & frameworks

The standards behind every report.

Every report aligns to the methodologies and frameworks your assessors, customers, and insurers already recognise, so findings are defensible, reproducible, and easy to validate.

  • CREST OSINT methodology
  • MITRE PRE-ATT&CK and ATT&CK reconnaissance techniques
  • NIST SP 800-150 (Guide to Cyber Threat Information Sharing)
  • STIX/TAXII for threat-intel data structuring

Outcomes

What you walk away with.

  • Proactive defence by highlighting external risks and exposures
  • Contextual threat intelligence to inform executive decision-making
  • Strengthens incident-response readiness and brand protection strategies
  • Continuous monitoring through recommended data-feeds and watch-lists

Get started

Talk to Pentiq about threat discovery (osint).

Most enquiries get a same working day response from a Pentiq consultant. We'll scope honestly and tell you when an alternative service is the right answer.