Work Services Process About Contact on LinkedIn

Cyber Threat Intelligence & External Risk

Protecting executives and organizations from digital exposure, identity compromise, and adversary threats.

I help security leaders and executives reduce external exposure, detect identity compromise from infostealers and data breaches, stop impersonation and fraud threats, and make informed decisions during incidents.

Notable Work & Contributions

A selection of high-impact projects, investigations, and industry contributions spanning over a decade in cyber threat intelligence.

What I Do

My consulting work spans these core areas of external threat intelligence and risk.

External Threat Intelligence

Monitoring and analyzing threats from dark web forums, marketplaces, and underground channels. I help organizations understand what adversaries are saying about them and planning against them.

Executive & Identity Risk

Assessing exposure of executives and key personnel to identity compromise, credential theft, and targeted attacks. This includes infostealer analysis and personal data exposure mapping.

Dark Web & Infostealer Intelligence

Deep expertise in compromised credentials, session tokens, and sensitive data exposed through infostealer malware. I've analyzed millions of stealer logs and understand how threat actors weaponize this data.

Fraud & Impersonation Threats

Identifying brand abuse, executive impersonation schemes, and fraud infrastructure targeting organizations. I've worked extensively in crypto where these threats are particularly sophisticated.

Incident Intelligence Support

When things go wrong, I help teams understand what happened, what's exposed, and what the adversary perspective looks like. Rapid intelligence during breaches and security incidents.

Adversary-Focused Investigations

Attribution, threat actor profiling, and investigative support. I've collaborated with law enforcement globally and understand how to build intelligence that supports real-world action.

I typically work as an embedded consultant or advisor, either augmenting existing security teams or providing specialized expertise on specific problems. Most engagements start with a conversation about what you're trying to solve.

How Engagements Work

A straightforward process designed for busy executives and security leaders.

01

Discovery Call

A brief conversation to understand your organization, concerns, and what you're looking to achieve. No commitment required.

02

Rapid Exposure Assessment

I conduct an initial assessment of your external exposure to identify immediate risks and demonstrate value before any ongoing engagement.

03

Delivery & Actions

Clear, executive-ready deliverables with prioritized findings and actionable recommendations your team can implement immediately.

04

Ongoing Monitoring

Optional continuous monitoring and retainer engagement for organizations that want persistent visibility into external threats.

All engagements are conducted with strict confidentiality. Sensitive findings are communicated through secure channels, and client information is never disclosed.

Fabio Correia

I'm a senior Cyber Threat Intelligence professional with over a decade of experience in external threat intelligence, dark web research, and adversary-focused investigations.

My career spans founding threat intelligence platforms, leading intelligence functions at major cryptocurrency exchanges, and working as an analyst at leading external threat intelligence vendors. I've collaborated with global law enforcement agencies and contributed research that has been cited across the security industry.

I bring a trusted, external perspective to organizations that need to understand and respond to threats beyond their perimeter. My work focuses on translating complex threat intelligence into clear, actionable insights for executives and security leaders.

Based in Lisbon, Portugal. Available globally.
Fabio Correia
10+ Years in CTI
Global Client Base
Dark Web Intelligence Executive Protection Infostealer Analysis Threat Research Incident Intelligence Identity Risk

Ready to discuss your external threat intelligence needs?

The best way to reach me is through LinkedIn. I respond to all serious inquiries within 24-48 hours.

Contact on LinkedIn

Based in Lisbon, Portugal. Available for remote engagements worldwide.