Leverage LookingGlass Expertise For Your Threat Intelligence Needs


Investigative Specialists
& Expert Analysts

Investigative Specialists & Expert Analysts

Eliminate the need for in-house staff to spend valuable time on manual reviews of thousands of websites and social media platforms. Tap into LookingGlass’ 20+ years of intelligence tradecraft and proprietary repositories for a unique perspective.

Global Coverage &
Geopolitical Intelligence

Global Coverage & Geopolitical Intelligence

Expand the depth and breadth of your coverage with cyber security veteran analysts that apply their cultural and foreign language skills to help you understand threats across the globe.

Open Source
Intelligence Database

Open Source Intelligence Database

Identify potential online vulnerabilities to help stakeholders better understand corporate and executive risks.


LookingGlass On-Demand Investigation and Analysis packages give you the flexibility to have any of the following requests fulfilled by our expert team. Purchase a single request, a bundle of ten, or an annual package of 1-8 cyber threat intelligence analyses per month.

Delivered Incident Investigation

Conduct cyber forensics and investigations  to provide additional context for an alert or a delivered incident from LookingGlass.

Online Executive Threat Assessment

A risk and vulnerability assessment of an executive’s online footprint, including the online activity of their spouse / partner and dependent children.

Client or Third Party Attack Surface Assessment

Assessment of the cybersecurity posture of a client or third party that evaluates evidence of system compromise and infection, compromised account credentials, vulnerabilities in externally facing applications, spear phishing risk, and online indications and warnings.

Person of Interest Investigation

Cyber forensic investigation into a POI (internal or external) that typically involves attempting to establish a real-life identity or future actions of a poster, threat agent, or other individual or interest.

Event / Pre-security Briefing

A formal report detailing the risks and vulnerabilities associated with an event of interest.

Threat Actor Profile / Research

Research and analysis of a bad actor’s tactics, techniques, and procedures (TTPs), links to any campaigns, investigation into motivation, group affiliations, and online presence.

Campaign / Breach Research

Typically involves attempting to establish attribution, malware campaign tracking, and / or determining attack scope, size, who is affected, and who has data in the wild.

Domain Investigation / Analysis

Investigation and analysis of suspicious domains or IP addresses for any malicious activities, links to known campaigns or threat actors, or past threat activity.

Due Diligence / Company of Interest Investigation

Investigation into a business of interest to include legal risks, regulatory compliance matters and sanctions review, reputation risks, and executive profile review.

Travel Advisory

A formal report detailing physical, cyber, and geopolitical risks associated with a designated geographic region or country / location of interest.

Cyber Attack Surface Analysis™ Report

Interested in knowing where your network is already compromised? Leverage our Cyber Attack Surface Analysis report to identify:

  • Live or recent network infections
  • Breached account credentials
  • Severity of vulnerabilities in public-facing applications
  • Fake/Lookalike domain names that are responsible for spear phishing attacks
  • Information for over 6,000 known threat actors, activists, and groups

Cyber Threat Intelligence.