Prescient leverages proprietary investigative tools, industry-leading monitoring technologies, and a proprietary database including over 34 billion records to mitigate risks posed by data breaches and adversarial actors.


Our team leverages proprietary investigative tools and expert OSINT tradecraft to provide key intelligence about an individual or entity’s online presence. Analysts identify all online accounts associated with a subject, both past and present, then pivot off provided and discovered PII to identify accounts created using aliases or pseudonyms. Accounts are identified on platforms like Yelp, Reddit, 4chan, and Tumblr, in addition to more traditional social media platforms like Facebook, Instagram, Twitter, and LinkedIn. Prescient then leverages its proprietary breached credentials repository to identify where a subject’s PII has been exposed on the dark web. Our repository contains upwards of 34 billion records and provides industry-leading coverage of large, medium, and small breaches. Utilizing access to closed communities, analysts also search for nefarious references to the subject.  

Ongoing Monitoring 

Our teams monitor the open, deep, and dark web 24/7 for threats or notable references to the client, including real-time alerting and analyst support. We offer filtering based on geotags and other location data, and cover data aggregators to flag when a subject’s PII becomes available to the public. Monitoring also leverages Prescient’s proprietary breached credentials repository that contains over 34 billion records.

Contact a Specialist



Who We Help

Our dedicated team of professionals has worked with corporate stakeholders, family offices, and others to address a variety of sensitive matters. We partner with: 

  • Chief Information Security Officers (CISOs)
  • Chief Information Officers (CIOs)
  • Chief Risk Officers
  • Chief Security Officers
  • Litigators & Outside Counsel
  • High-net-worth Individuals (HNWIs) & Family Offices
  • Penetration Testing & Incident Response Firms

How It Works

Assessments and monitoring cover the following sources, among others:

  • Prescient’s Leaked Credential Repository
  • Cyber Black Markets
  • Hacker Communities
  • Dark Web Search Engines & Directories
  • Open Source Leaked Credential Repositories
  • Messaging Platforms

Our Insights

Solution Spotlight | Cybersecurity for HNWIs & Family Offices

Interview | Craig Donlon, Director of Investigations

Welcome to our newest Due Diligence and Cyber Team Members!

Prescient hires William Dixon to build out Cyber Consulting presence on West Coast