HELIOS
An AI-powered platform that transforms cyber intelligence, attribution & threat actor identification
HELIOS is ACFC's patent-granted, in-house built AI-powered threat attribution and attack intelligence platform built to defend over 2,000 public IP addresses, 600+ applications, 1,000 APIs, and a complex digital ecosystem across the region.
See your organisation the way attackers do.
HELIOS is ACFC's in-house, patent-granted AI threat attribution and attack intelligence platform. It was built to solve the problem of defending over 2,000 public IP addresses, 600+ applications, 1,000 APIs, and a complex vendor ecosystem across 12 operating entities.
Existing tools operated in silos. Assessing risk exposure took weeks. So ACFC designed HELIOS as a unified platform that continuously maps attack surfaces, crawls the open, deep, and dark web, and correlates every finding with real adversary intelligence in real time.
The result: attack surface discovery in under 24 hours, and 115+ automated intelligence reports per week all validated by human analysts before any action is recommended.
Everything attackers look for. Found first by HELIOS.
HELIOS covers every reconnaissance and intelligence-gathering technique a sophisticated adversary would use to profile, penetrate, and exploit your organisation. Each capability is automated and every output is validated by a human analyst.
Four things no other platform in the region does.
Most threat intelligence platforms aggregate feeds. HELIOS was built to answer a harder question: given what we know about the specific adversaries targeting this specific organisation, where exactly are they most likely to get in and how?
Validated by independent industry authorities.
Most threat intelligence platforms aggregate feeds. HELIOS was built to answer a harder question: given what we know about the specific adversaries targeting this specific organisation, where exactly are they most likely to get in and how?
Cybersecurity Innovation Product of the Year
Malaysia Cyber Security Awards — recognising the most technically innovative cybersecurity product in the Malaysian market, judged by the national cybersecurity authority.
2024AIBP Enterprise Innovation Award
Association for Information and Business Professionals — recognising HELIOS's contribution to enterprise-grade AI-driven security innovation across the ASEAN region.
2024Cybersecurity Initiative of the Year — Malaysia
Asian Telecom Awards — recognising HELIOS as the leading cybersecurity initiative by a telecommunications operator in Southeast Asia.
Asian Telecom Awards 2025Telecommunications Initiative Award
National Business Malaysia Awards — recognising ACFC HELIOS as the most significant technology initiative in the Malaysian telecommunications sector.
National Business Malaysia AwardsAI that analysts can trust.
HELIOS embodies a human-in-the-loop approach. AI-driven insights are systematically validated by ACFC's cybersecurity analysts before any output is acted upon or reported.
Automated platforms that act without human validation produce two outcomes: missed threats (false negatives) and wasted analyst time (false positives). HELIOS eliminated false positives to near 0% by combining machine learning correlation with structured analyst review.
This approach also ensures explainability a requirement for enterprise governance, regulatory compliance, and board-level risk reporting that black-box AI platforms cannot satisfy.
See your organisation the way HELIOS sees it.
Request a live HELIOS demonstration. We'll show you what's currently visible about your organisation from the outside attack surface, dark web exposure, and any immediate risks in real time.
Or email hello@axiatacfc.com
HELIOS is available as part of ACFC's managed security services or as a standalone engagement.
HELIOS
An AI-powered platform that transforms cyber intelligence, attribution & threat actor identification
HELIOS is ACFC's patent-granted, in-house built AI-powered threat attribution and attack intelligence platform built to defend over 2,000 public IP addresses, 600+ applications, 1,000 APIs, and a complex digital ecosystem across the region.
See your organisation the way attackers do.
HELIOS is ACFC's in-house, patent-granted AI threat attribution and attack intelligence platform. It was built to solve the problem of defending over 2,000 public IP addresses, 600+ applications, 1,000 APIs, and a complex vendor ecosystem across 12 operating entities.
Existing tools operated in silos. Assessing risk exposure took weeks. So ACFC designed HELIOS as a unified platform that continuously maps attack surfaces, crawls the open, deep, and dark web, and correlates every finding with real adversary intelligence in real time.
The result: attack surface discovery in under 24 hours, and 115+ automated intelligence reports per week all validated by human analysts before any action is recommended.
Attack Surface Discovery
Continuously maps every externally visible asset IPs, subdomains, domains, APIs, open ports, SSL certificates, and email addresses to produce a complete picture of what attackers can see about your organisation. Updated in under 24 hours.
Dark & Deep Web Intelligence
Crawls 100+ Telegram channels, underground forums, and dark web marketplaces for leaked credentials, data dumps, threat actor chatter, and organisation-specific mentions.
Threat Attribution
Identifies and profiles the adversary groups behind attacks linking indicators of compromise to known threat actors from a database of 700+ profiles.
Correlated Attack Intelligence
Correlates findings across attack surface data, vulnerability intelligence, dark web mentions, and telemetry producing chains of exposure that show how a specific threat actor could exploit your specific environment.
IT · OT · IoT Coverage
Unlike most commercial platforms built for enterprise IT, HELIOS covers IT, OT (Industrial Control Systems, SCADA), and IoT environments.
Everything attackers look for. Found first by HELIOS.
HELIOS covers every reconnaissance and intelligence-gathering technique a sophisticated adversary would use to profile, penetrate, and exploit your organisation. Each capability is automated and every output is validated by a human analyst.
Attack Surface Discovery - Full External Perimeter Mapping
The complete picture of what adversaries see before they attack. HELIOS automatically discovers and maps your entire external digital footprint in under 24 hours.
Leaked Credentials Discovery
Monitors the dark web, underground marketplaces, and public data breaches for credentials tied to your domains. 7B+ records detected to date.
GitHub / Code Repository Leaks
Scans public and exposed code repositories for hardcoded credentials, API keys, private certificates, and sensitive configuration files.
Subdomain Discovery
Comprehensive subdomain enumeration to identify forgotten, test, or shadow IT subdomains that are exposed to the internet but not under active security management.
Phishing Domain Detection
Generates and monitors potential phishing domain variants based on your brand name identifying domains registered by adversaries before they go live.
API Leaks Discovery
Finds exposed Postman collections, Swagger specs, and public API endpoints leaking sensitive data, authentication tokens, and internal service architecture.
Cloud Open Container Discovery
Identifies misconfigured cloud storage buckets and containers (AWS S3, Azure Blob, GCP) that are publicly accessible.
Threat Intelligence via Dark Web Crawling
Continuous monitoring of 100+ Telegram channels, dark web forums, and criminal marketplaces for organisation-specific mentions and threat actor activity.
Vulnerable Host Discovery
Identifies hosts in your external perimeter running known-vulnerable software versions, exposed management interfaces, and unpatched services.
IP Asset Discovery
Discovers all IP addresses associated with your organisation across cloud, on-premises, and co-location environments.
Service Enumeration & Port Scanning
Identifies all services running on externally accessible ports including non-standard ports, legacy protocols, and development services.
Historic DNS Enumeration
Analysis of historical DNS records to identify previously registered subdomains, decommissioned services, and IP address history.
Email Discovery
Enumerates email addresses associated with your domains across public and dark web sources identifying employee accounts exposed in third-party breaches.
Web Application Vulnerability Scanning
Automated scanning of internet-exposed web applications for OWASP Top 10 vulnerabilities, known CVEs, and common misconfigurations.
Four things no other platform in the region does.
Most threat intelligence platforms aggregate feeds. HELIOS was built to answer a harder question: given what we know about the specific adversaries targeting this specific organisation, where exactly are they most likely to get in and how?
Attack Intelligence - Correlated Insights, Not Disconnected Findings
Most tools present vulnerabilities or dark web mentions as isolated lists. HELIOS adds a layer of correlation by linking security issues back to each subdomain with known threat actor behaviors. This correlation gives analysts the context needed to determine credible attack paths rather than working from disconnected data points.
Offensive Automation - Attack Surface Mapped in Under 24 Hours
The discovery that previously took a security team two weeks of manual work identifying every externally visible asset HELIOS does in under 24 hours, continuously. Not as a one-time snapshot, but as an ongoing live map.
Correlated to Your Environment - Intelligence That Means Something
Dark web intelligence that isn't linked to your specific assets is noise. HELIOS correlates underground intelligence leaked credentials, code repository leaks, API exposures, phishing domains directly against your organisation's actual digital footprint.
Business Risk View - Attack Paths Scored by Likelihood & Impact
HELIOS doesn't produce a list of 300 medium-severity findings and leave you to work out what matters. It produces a risk-prioritised view of attack paths ranked by likelihood and business impact. Designed for CISO reporting and Board-level risk communication.
Validated by independent industry authorities.
HELIOS has won four regional cybersecurity awards since launch each judged independently by industry bodies evaluating innovation, technical merit, and real-world impact.
Cybersecurity Innovation Product of the Year
Malaysia Cyber Security Awards — recognising the most technically innovative cybersecurity product in the Malaysian market, judged by the national cybersecurity authority.
2024AIBP Enterprise Innovation Award
Association for Information and Business Professionals Enterprise Innovation Award — recognising HELIOS's contribution to enterprise-grade AI-driven security innovation across the ASEAN region.
2024Cybersecurity Initiative of the Year — Malaysia
Asian Telecom Awards — Cybersecurity Initiative of the Year (Malaysia category), recognising HELIOS as the leading cybersecurity initiative by a telecommunications operator in Southeast Asia.
Asian Telecom Awards 2025Telecommunications Initiative Award
National Business Malaysia Awards — recognising ACFC HELIOS as the most significant technology initiative in the Malaysian telecommunications sector.
National Business Malaysia AwardsAI that analysts can trust.
HELIOS embodies a human-in-the-loop approach. AI-driven insights are systematically validated by ACFC's cybersecurity analysts before any output is acted upon or reported.
Automated platforms that act without human validation produce two outcomes: missed threats (false negatives) and wasted analyst time (false positives). HELIOS eliminated false positives to near 0% by combining machine learning correlation with structured analyst review.
This approach also ensures explainability a requirement for enterprise governance, regulatory compliance, and board-level risk reporting that black-box AI platforms cannot satisfy.
Continuous Automated Discovery
HELIOS scanning and crawling engines run continuously mapping attack surfaces, monitoring dark web channels, and correlating intelligence across all sources.
AI Correlation & Pattern Detection
Machine learning models identify patterns, link indicators, attribute findings to threat actors, and produce ranked attack path hypotheses.
Analyst Validation
ACFC's human analysts review every AI-generated finding confirming validity, adding operational context, and eliminating false positives before escalation.
Validated Intelligence Output
Findings reach your team as validated, prioritised, actionable intelligence not raw machine output. 115+ reports per week, 0% false positive rate.
see your organisation the way HELIOS sees it.
Request a live HELIOS demonstration. We'll show you what's currently visible about your organisation from the outside attack surface, dark web exposure, and any immediate risks in real time.
Or email hello@axiatacfc.com
HELIOS is available as part of ACFC's managed security services or as a standalone engagement.