BI.ZONE Unveils Innovative Feature on Threat Intelligence Portal to Enhance Cybersecurity Insights

BI.ZONE has announced that a new feature, «Shadow Resources,» has been added to its BI.ZONE Threat Intelligence cyber intelligence portal. This tool enables security professionals to independently search for information about their organization within shadow resources. Additionally, «Shadow Resources» allows for the analysis of discussions among cybercriminals and provides proactive assessments of cyber threats to prevent potential targeted attacks.

For instance, in the «Account Search» section, cybersecurity experts can verify whether any corporate accounts have been compromised. Searches can be conducted using email addresses, mail domains, all associated subdomains, or specific resource URLs.

According to the head of BI.ZONE Threat Intelligence:

*»Previously, shadow resources were investigated by BI.ZONE Threat Intelligence experts, and users could only access analytical materials generated from this research on the portal. Now, we’ve equipped users with tools for independent searching. The new «Shadow Resources» section will allow specialists to look for information about either their own company or organizations that are clients of that company if they are responsible for protecting their data.»*

Another section of the site, «Search in Shadow Resources,» provides access to data from communication platforms utilized by cybercriminals, such as shadow forums and Telegram channels. This feature will help users stay informed about the tools and methods currently being targeted by cybercriminals.

Both sections offer options to filter information based on various criteria, customize alerts for new data of interest, export results in CSV format, and review a history of queries for quick re-access when needed.

In early February 2025, BI.ZONE released Threat Zone 2025, an annual study detailing the cyber landscape in Russia and other CIS countries. The study revealed that in 2024, the highest number of cyberattacks occurred in the government sector (15%), followed by the financial industry (13%) and transportation and logistics (11%). It was noted that attackers increasingly targeted companies for espionage and ideological reasons. Criminals continue to innovate with their tools and methods, yet phishing remains the most popular means of infiltrating IT infrastructures, despite a decrease in its prevalence by the end of 2024.