Threat Landscape Discovery
Before any attacker buys an exploit, they Google. Pentiq runs OSINT and dark-web reconnaissance across DNS, breach lists, paste sites, typosquats, and brand-impersonation chatter - so you find out what's out there before someone with worse intentions does.
Try a free version first
The OSINT Preview runs three public-record lookups against a single domain - free, in your browser, no obligation. A taster of what the full engagement uncovers.
What we test
What's already public about your organisation, leaked, or for sale?
Public and semi-public data sources (DNS, WHOIS, social media, paste sites), credential leak databases, dark-web and underground-forum chatter for brand and executive mentions, and lookalike-domain registrations that suggest an upcoming campaign.
Why it matters
The pressure this service answers.
Credentials leaked in an unrelated breach become your next phishing campaign. Knowing what's already public is the cheapest defensive control there is.
Findings from this engagement commonly support evidence for DORA Article 25 and NIS2 Article 21.2.e.
Testing activities
Manual, reproducible, peer-reviewed.
Every engagement is scoped through a formal Rules of Engagement, delivered by an in-house Pentiq consultant, peer-reviewed by a senior tester, and risk-rated using CVSS 4.0 where applicable.
- Collection of public and semi-public data sources (DNS, WHOIS, social media, paste sites)
- Credential-leak analysis and breach-list correlation
- Dark-web and underground-forum monitoring for brand or executive mentions
- Detection of typosquat and lookalike domains
- Attribution assessment of potential threat actors and campaigns
- Intelligence-report delivery with priority remediation actions and monitoring recommendations
Methodologies & frameworks
The standards behind every report.
Every report aligns to the methodologies and frameworks your assessors, customers, and insurers already recognise, so findings are defensible, reproducible, and easy to validate.
- CREST OSINT methodology
- MITRE PRE-ATT&CK and ATT&CK reconnaissance techniques
- NIST SP 800-150 (Guide to Cyber Threat Information Sharing)
- STIX/TAXII for threat-intel data structuring
Outcomes
What you walk away with.
- Proactive defence by highlighting external risks and exposures
- Contextual threat intelligence to inform executive decision-making
- Strengthens incident-response readiness and brand protection strategies
- Continuous monitoring through recommended data-feeds and watch-lists
Often paired with
Related services.
External Infrastructure
Internet facing servers, services, and edge devices, tested the way attackers actually approach them.
Learn more →
Web Application & API
Authenticated and unauthenticated testing of business critical web apps and APIs, mapped to OWASP and beyond.
Learn more →
Cloud Security
Configuration and exposure reviews across AWS, Azure, and Microsoft 365 - including identity, permissions, and data paths.
Learn more →
Get started
Talk to Pentiq about threat discovery (osint).
Most enquiries get a same working day response from a Pentiq consultant. We'll scope honestly and tell you when an alternative service is the right answer.
