Every day we monitor thousands of
incidents and create digital fingerprints of
cybercriminals

Read our latest reports

Proactive defense against future threats

Proactive defense against future threats

WHY CYBER INTELLIGENCE?

Because attackers have no rules and are continuously developing new methods, the battle against cyber incidents must always be one step ahead of any potential threats. Focusing on the here and now makes it very challenging to keep pace with cybercrime.

ABOUT US

OUR SUCCESS

Since 2012, PRODAFT has been a key solution provider for various critical sectors, including banking and finance, fintech, aviation, insurance, IoT, defense, and telecommunication. Due to the “customized” approach of our solutions, client turnover of PRODAFT is virtually nil, as we recognize the priorities and requirements unique to each industry.

Our commitment in this regard is the main reason behind PRODAFT’s popularity among high-profile organizations.

OUR EXPERTISE

PRODAFT has become a trusted partner for hundreds of financial institutions, e-commerce vendors, payment gateways, aviation companies, insurance providers, power production companies, and various critical infrastructures

Services

Serving several critical infrastructures in multiple countries since 2012, PRODAFT has consistently exceeded customer expectations in everything from penetration testing and security training to cyber attack drills and custom-tailored consulting.

Are you ready for a real cyber attack ?

Cyber Attack Drills

Are you ready for a real cyber attack ?

arrow

Cyber Attack Drills

Test your cyber defense capabilities against a well-prepared attack based on a real life scenario.

arrow
Penetration Tests

Penetration Tests

Secure your applications and servers

arrow

Penetration Tests

PRODAFT penetration tests are far more realistic and effective than others, which tend to rely on automatized vulnerability scanning tools.

arrow
IOT Security Consulting

IOT Security Consulting

Secure your high risk investments

IOT Security Consulting

For every IoT solution, PRODAFT curates a team from among our engineers to serve as the perfect fit for the project.

Advanced Code Review

Advanced Code Review

Identify the risks in your software

Advanced Code Review

This service is a must for mission-critical applications that will be used in networks requiring extreme confidentiality.

Digital Forensics

Digital Forensics

Top notch cyber forensics team at your fingertips

Digital Forensics

The main objective of our forensic analysis services is to uncover the details of a cyber attack, whether it's an insider threat or an APT scenario.

“Red-Team” Testing

“Red-Team” Testing

Open-scope attack simulation with a specific objective

“Red-Team” Testing

Red team tests are specifically applied for testing effectiveness of your organization’s overall security (both physical and digital) against a specific concern or threat.

Cyber Security Training

Cyber Security Training

The weakest link of the security chain: Human Errors

Cyber Security Training

Each PRODAFT training is given by a recognized expert, who has been focusing on the same field for several years and has published several articles.

PRODAFT offers customized and proactive approaches against constantly evolving cyber attack techniques.

ABOUT US

Trusted by clients all over the world, PRODAFT focuses on repelling cyber threats with Swiss precision and neutrality.

Learn More
U.S.T.A.

U.S.T.A.

U.S.T.A. is one of the first cyber intelligence platforms ever developed. It features a unique synergy of threat intelligence, fraud intelligence, and brand protection modules.

Proactive

Proactive

Actionable

Actionable

To-the-point

To the point

Primarily used by incident response, security operations, fraud prevention, and brand protection teams in critical infrastructures, each U.S.T.A. module has been developed according to the following set of key principles.

LEARN MORE

Discover Our Resources

Organized Cyber-Crime
[Conti] Ransomware Group In-Depth Analysis

PRODAFT Threat Intelligence (PTI) Team has obtained valuable insights on theinner workings of the Conti ransomware group. The PTI team accessed Conti’...

Botnet
[SOLARMARKER] In-Depth Analysis Report

The PRODAFT Threat Intelligence (PTI) team has assembled this report to provide in-depth knowledge about Solarmarker malware and the threat actors beh...

metasploit advisory exploit
LiderAhenk 0day - All your PARDUS Clients Belongs To Me (CVE-2021-3825)

LiderAhenk is an open source software system that enables centralized management, monitoring and control of systems and users on the corporate netwo...

advisory 0day exploit linux
Pardus 21 Linux Distro - Remote Code Execution 0day 2021 CVE-2021-3806

A couple of days ago, I came up with news that Pardus will organize a report-bug contest. I love to contribute to open-source projects. So that was a...