Threat actor in action · Fortgale proprietary intelligence
Service · CTI · proprietary intelligence

Know before the attack happens.

Fortgale CTI reinforces enterprise defence before an attack becomes an incident. We track hostile actors, generate continuous IOC feeds, produce vertical advisories, briefings for the CISO and reports for the board, monitor deep & dark web, and manage IT and brand exposure.

180+Adversaries profiled
34 k+Weekly IOCs
24·7Dark web monitoring
Compliance · accreditations
ISO/IEC 27001
NIS2 ready
GDPR · ENISA
Standards · frameworks
MITRE ATT&CK
STIX/TAXII
OpenCTI
OSINT
Eight capabilities · activate them individually

Eight specialist CTI modules.
Each answers a concrete need.

Fortgale CTI is delivered as eight specialist capabilities, activated individually or in combination based on your organisation's context. From hostile actor tracking to critical vendor monitoring: each module answers a concrete question from the CISO, the SOC, or the board. Under each capability, a «Relevant when…» section helps you understand which ones you actually need.

01 Adversary intelligence

Threat Actor Profiling & Attribution

TTP profiles, victimology, attack attribution

Structured profiles of criminal groups and state actors active against European organisations: MITRE ATT&CK-mapped TTPs, observed C2 infrastructure, tooling, victimology. Where evidence allows, technical attribution of attacks detected against customers.

Relevant when

You have suffered incidents with signs of targeted intent · you operate in target sectors (finance, manufacturing, energy, healthcare, public administration, defence) · you hold high-value assets (IP, sensitive data).

Explore the module →
02 Automated feed

Threat Intelligence Feed · STIX/TAXII

Continuous IOCs · machine-readable · SIEM/EDR/firewall

Indicators of compromise (IPs, domains, hashes, URLs, YARA rules) generated from real incidents and research, distributed via STIX/TAXII directly into customer security platforms. Automatic application, no manual intervention required.

Relevant when

You run SIEM/EDR/firewall platforms that support custom TI · your SOC wants to enrich detection with contextual IOCs · NIS2/DORA require TI integration into your controls.

Explore the module →
03 Industry-specific threat reports

Vertical sector advisories

Active campaigns, tracked groups, sector IOCs and TTPs

Reports dedicated to individual sectors: manufacturing, finance, healthcare, energy, public administration, critical infrastructure. When the CTI team detects targeted campaigns, customers in the affected sector receive ad-hoc advisories with immediate operational guidance.

Relevant when

You operate in a specific vertical sector (manufacturing, finance, healthcare, energy, public administration, critical infrastructure) and want intelligence focused on threats targeting your industry.

Explore the module →
04 Business-risk language

Executive Briefing & Board Reporting

Reports for CISOs, risk committees, and boards

Periodic briefings for the CISO, IT Manager, Head of Cybersecurity: exposure status, actors active against the organisation, decisions required. Dedicated reports for the board in business-risk language, compliance, and impact framing.

Relevant when

The board requires regular updates on cyber risk · you must demonstrate NIS2/DORA governance to the board · the CISO needs to communicate in business language, not technical.

Explore the module →
05 Continuous surveillance

Deep & Dark Web Monitoring

Marketplaces, leak sites, Telegram, criminal forums

Continuous presence in criminal marketplaces, underground forums, ransomware leak sites, Telegram channels, anonymised networks. Search for compromised corporate credentials, exfiltrated data, customer mentions, planning of imminent attacks.

Relevant when

You fear corporate credential leaks · you are a visible brand · you operate in ransomware target sectors · you want to intercept the planning of attacks before execution.

Explore the module →
06 IT exposure

Attack Surface Management

Internet-facing assets, vulnerabilities, shadow IT, misconfigurations

Continuous discovery and monitoring of the external attack surface: internet-facing assets, exploitable vulnerabilities, shadow IT, expired certificates, leaked credentials, cloud misconfigurations. Prioritisation by real-world impact and exploitability.

Relevant when

You have a wide external surface (multi-cloud, frequent M&A, ungoverned shadow IT) · you struggle to prioritise known vulnerabilities · you want to be preventive, not reactive.

Explore the module →
07 Brand & reputational exposure

Brand & Social Intelligence

Domain spoofing, fake profiles, phishing kits, impersonation

Monitoring of the non-IT attack surface: look-alike domains, fake LinkedIn/Telegram profiles, phishing kits using the customer's logo, executive impersonation, reputational mentions, deepfakes. Coordinated take-down where feasible.

Relevant when

Recognisable brand targeted by phishing/spoofing · executives with exposed public profile · brand impacts conversion (finance, retail, luxury, private healthcare) · you need coordinated take-down of online abuse.

Explore the module →
08 Vendor exposure

Supply Chain Security Monitoring

Exposure, breach and risk of critical vendors

Continuous monitoring of the external exposure and public incidents of critical vendors: credential leaks, exploitable vulnerabilities, appearance on ransomware leak sites, overall cyber posture. Immediate alert on vendor breach — to understand the inherited cyber risk and activate countermeasures before it translates into your own incident.

Relevant when

You rely on critical vendors (cloud, software, MSP, financial services, logistics) whose compromise exposes you · NIS2/DORA require third-party risk governance · you must demonstrate due diligence after a vendor breach.

Explore the module →
Assessment · CTI

Talk to our analysts to design your CTI programme.

30 minutes with a Fortgale analyst · no obligation

In a free session we review together your context — sector, high-value assets, recent incidents, external exposure — and identify which of the 7 modules bring real value, and which don't.

What you receive

A relevance map of the modules for your organisation + a tailored modular proposal. No obligation to continue.

Book the assessment →

Each module is activated individually or in combination. Modular pricing based on perimeter and volume.

The Fortgale advantage

The intelligence no vendor can sell you.

There are hundreds of threat intelligence feeds on the market. Most aggregate third-party data and resell it. Fortgale does something radically different: we generate original intelligence, every day.

01 ·

Intelligence from real incidents

Every incident handled by the Fortgale SOC becomes structured intelligence: IOCs observed in real conditions, documented TTPs, mapped offensive infrastructure. Not theoretical models — artefacts extracted from attacks against European organisations in the past 24 hours.

02 ·

Independent threat actor research

The Fortgale CTI team independently analyses campaigns, infrastructure and tools of major criminal groups and state-sponsored actors active against Europe. Without depending on vendors or aggregators: original analyses, our own attributions, independent publications.

03 ·

AI as multiplier, not replacement

Fortgale uses internally-developed artificial intelligence to amplify analysts: high-volume correlation, known-campaign pattern recognition, alert prioritisation. No third-party AI products: internal systems trained on our own data.

Proof · scale of intelligence

Four numbers that anchor Fortgale CTI.

Proprietary database of adversaries active against Europe, real-time IOC distribution, continuous dark web coverage, bilingual reports for management and technical teams.

180+
Adversaries profiled
targeting European markets
34 k+
Indicators of compromise
produced weekly
D/DW
Deep & Dark Web
continuously monitored
EN/IT
Bilingual reports
technical + executive
Research · recent publications

Our research, published on the blog.

We profile actors, analyse samples, track campaigns. A part of this research we share with the community on our blog. We don't aggregate third-party feeds — we publish only what we have verified first-hand.

Defence15 Apr 2026

Phishing Kits Bypass MFA and Hijack companies's accounts in minutes

Intelligence · Phishing Kit · Q1 2026 April 24, 2026Fortgale CTI14 min readRPT-26-0424 Observation of the quarter The 2026 phishing ecosystem has outpaced tradition…

Read article →
Featured8 Apr 2026

Investment-Targeted Phishing: How Phishing Kit Fuels Espionage in Funding Rounds

In the high-stakes world of venture capital and corporate funding, where millions hang in the balance and sensitive financial data flows freely, a new breed of cyber threat is em…

Read article →
Defence13 Mar 2026

Operation Storming Tide: A massive multi-stage intrusion campaign

In February 2026, the Fortgale Incident Response team investigated a multi-stage intrusion attributed to Mora_001, a Russian-origin threat actor exploiting Fortinet vulnerabiliti…

Read article →
Featured4 Sep 2024

Behind the Wheel: Unveiling the Supercar Phishing Kit Targeting Microsoft 365

UPDATES: 27.11.2024: As mentioned by TrustWave, "Supercar Phishing Kit" has an high level of overlapping with the most recent update of "Rockstar 2FA Phishing-as-a-Service" 26.09…

Read article →
Featured18 Dec 2023

Espionage activities targeting European businesses

In the evolving landscape of cybersecurity threats, Fortgale is tracking PhishSurf Nebula, an advanced Cyber Espionage group active since 2021 and primarily targeting entities wi…

Read article →
Featured6 Dec 2023

Nebula Broker: offensive operations made in Italy

Fortgale has been tracking an Italian Threat Actor, internally dubbed as Nebula Broker, since March 2022. The actor uses self-made malware (BrokerLoader) to compromise Italian sy…

Read article →
How you receive the intelligence

Four delivery formats, integrated into your workflows.

The seven CTI capabilities are delivered in four operational formats: bilingual PDFs for management and analysts, STIX/TAXII feeds consumable by SIEM/EDR, real-time alerts via webhook, and live briefings with analysts. Every deliverable is designed to plug into existing processes, with no overhead.

01

Bilingual PDF reports

Threat reports, vertical advisories, and executive briefings as PDF in English and Italian. Two cuts per report: technical for SOC analysts and threat hunters (TTPs, IOCs, MITRE mapping) and executive for management and boards (business risk, prioritised actions).

PDF · EN/ITTechnical versionExecutive versionMITRE mapping
02

STIX/TAXII feed · API

Machine-readable IOCs directly consumable by SIEM, EDR, firewall, and TIP platforms. Standard STIX 2.1 / TAXII 2.1 integration, Custom Threat Intelligence support on major MDR platforms. Continuous rotation, validated indicators.

STIX 2.1TAXII 2.1REST APICustom TI
03

Real-time alerts · webhook

Immediate notifications on detection of corporate credentials on leak sites, customer mentions in forums, appearance of look-alike domains, high-priority IOCs. Delivery via email, webhook, Slack, Microsoft Teams. Sub-15-minute delivery SLA.

WebhookEmail · SMSSlack · Teams15-min SLA
04

Live briefings · analyst q&a

Periodic sessions with the CTI team: advisory walkthroughs, technical q&a, deep-dives on specific actors detected in the customer environment. On demand: convene an analyst for triage or post-incident support.

Periodic briefingsAnalyst Q&AOn demandWalkthrough
The operating model

Analysts amplified by AI. Not replaced.

AI turns raw data into signals; analysts turn signals into decisions. Fortgale has internally developed the AI tools that amplify our team — without ceding control to external platforms.

  1. 01

    Large-scale automated correlation

    Internal AI systems correlate millions of network, endpoint and threat feed events in real time, identifying patterns that would require hours of manual analysis. Analysts receive prioritised signals, not raw noise.

  2. 02

    Pattern recognition on known campaigns

    Internal models recognise the fingerprints of tracked threat actors — infrastructure, toolsets, behaviour — accelerating attribution and reducing response times from hours to minutes.

  3. 03

    Independent, verifiable analysis

    No third-party black-box algorithms. Every analysis is produced by the team with documented methods and verifiable results. When Fortgale attributes a campaign to an actor, it's because we have technical evidence — not on a vendor's suggestion.

  4. 04

    Intelligence that improves over time

    Each new incident enriches internal models. Fortgale CTI becomes progressively more accurate for customers in continuous engagement: the historical context of their infrastructure is integral to every new analysis.

What we observe

An example of tracked compromise.

The TTPs feeding Fortgale CTI come from real incidents: enumeration, lateral movement, credential dumping, exfiltration. The video below is a simulation of an actor's recurring behaviour — the kind of evidence a customer sees in our monthly reports.

FAQ · frequent questions

Everything you need to know about Fortgale CTI.

What sets Fortgale CTI apart from commercial feeds?

Most CTI vendors resell feeds aggregated from third parties (VirusTotal, Mandiant, Recorded Future). Fortgale generates original intelligence from three primary sources: incidents handled by the SOC daily, independent threat actor research, continuous deep & dark web monitoring. Contextual, current, applicable intelligence.

What are Fortgale IOCs and how are they applied?

Indicators of Compromise (IPs, domains, hashes, URLs, YARA rules) are produced from real incidents and research on offensive infrastructure. They are distributed automatically to customer SIEM/EDR/firewalls via STIX/TAXII and applied as Custom Threat Intelligence on MDR platforms, blocking known threats before impact.

What does dark web monitoring include?

Search for compromised corporate credentials in criminal marketplaces, monitoring of forums where actors plan attacks, detection of exfiltrated data on ransomware leak sites, tracking of Telegram channels and anonymised networks, real-time alerts when the customer name appears.

Who are the CTI reports for?

Two formats: technical reports for security teams (SOC analysts, threat hunters, technical CISOs) with IOCs, MITRE-mapped TTPs and operational guidance; executive reports for management with risk language, business impact, and prioritised actions. Published in English and Italian.

Is CTI accessible without Fortgale SOC/MDR?

Yes. The CTI service is available both as an integrated component of SOC/MDR (intelligence applied automatically to detection rules) and as a standalone service for companies with internal security teams who want to enrich it with proprietary IOC feeds, vertical advisories, and threat actor reports.

What does Attack Surface Management cover in the CTI service?

Fortgale ASM performs continuous discovery and monitoring of the customer's external attack surface: internet-facing assets, exploitable vulnerabilities, shadow IT, expired certificates, leaked credentials, cloud misconfigurations (S3, Azure Blob, GCP). Everything is correlated with internal threat intelligence to prioritise what is actually exploitable by actors active against the customer's sector — not a list of theoretical vulnerabilities, but a list of concrete risks.

What does Brand & Social Intelligence include?

Monitoring of the non-IT attack surface: look-alike domains, fake LinkedIn/Telegram profiles impersonating executives, phishing kits using the customer's logo, executive impersonation, deepfakes, reputational mentions in criminal channels. Coordinated take-down with providers (registrars, social platforms, hosters) where feasible.

Do you produce briefings for boards and risk committees?

Yes. The Executive Briefing & Board Reporting service produces dedicated reports for the board and risk committees in business-risk language: exposure status, actors active against the organisation, NIS2 and DORA compliance, required decisions, potential economic impact. An operational tool for cyber governance at board level.

How does attack attribution work?

Technical attribution is part of Threat Actor Profiling. When the CTI team detects an incident, observed TTPs (MITRE ATT&CK-mapped), C2 infrastructure, tooling, malware code, and victimology are correlated with profiles of already-tracked actors. When evidence is sufficient, a documented attribution is formulated. When it is not, the most likely hypotheses are indicated without overreach — rushed attribution is one of the most common bad practices in commercial CTI.

Start with CTI

What does your adversary know that you don't yet?

Dark web monitoring, proprietary IOCs, and Fortgale reports give you access to the intelligence usually only large enterprises can afford. Speak with the CTI team and find out what we're tracking today.

Response time: < 1 business day.