PATENT GRANTED — MY-212304-A

HELIOS

An AI-powered platform that transforms cyber intelligence, attribution & threat actor identification

HELIOS is ACFC's patent-granted, in-house built AI-powered threat attribution and attack intelligence platform built to defend over 2,000 public IP addresses, 600+ applications, 1,000 APIs, and a complex digital ecosystem across the region.

7b+
Leaked data records detected across the digital ecosystem
700+
Individual threat actor profiles tracked and attributed
<24h
Attack surface fully mapped (reduced from 2 weeks)
100+
Telegram & underground channels monitored continuously
Patented
HELIOS patent granted by MyIPO – MY-212304-A
WHAT IS HELIOS

See your organisation the way attackers do.

HELIOS is ACFC's in-house, patent-granted AI threat attribution and attack intelligence platform. It was built to solve the problem of defending over 2,000 public IP addresses, 600+ applications, 1,000 APIs, and a complex vendor ecosystem across 12 operating entities.

Existing tools operated in silos. Assessing risk exposure took weeks. So ACFC designed HELIOS as a unified platform that continuously maps attack surfaces, crawls the open, deep, and dark web, and correlates every finding with real adversary intelligence in real time.

The result: attack surface discovery in under 24 hours, and 115+ automated intelligence reports per week all validated by human analysts before any action is recommended.

Attack Surface Discovery
Continuously maps every externally visible asset — IPs, subdomains, APIs, SSL certs. Updated in under 24 hours.
Dark & Deep Web Intel
Crawls 100+ Telegram channels, underground forums, and dark web marketplaces for leaked credentials and threat actor activity.
Threat Attribution
Identifies and profiles adversary groups — linking indicators of compromise to 700+ known threat actor profiles.
Correlated Intelligence
Correlates attack surface data, vulnerability intel, and dark web mentions into chains of exposure.
IT · OT · IoT Coverage
Covers IT, OT (ICS/SCADA), and IoT environments — unlike commercial platforms built only for enterprise IT.
CAPABILITIES

Everything attackers look for. Found first by HELIOS.

HELIOS covers every reconnaissance and intelligence-gathering technique a sophisticated adversary would use to profile, penetrate, and exploit your organisation. Each capability is automated and every output is validated by a human analyst.

WHY HELIOS IS DIFFERENT

Four things no other platform in the region does.

Most threat intelligence platforms aggregate feeds. HELIOS was built to answer a harder question: given what we know about the specific adversaries targeting this specific organisation, where exactly are they most likely to get in and how?

AWARDS & RECOGNITION

Validated by independent industry authorities.

Most threat intelligence platforms aggregate feeds. HELIOS was built to answer a harder question: given what we know about the specific adversaries targeting this specific organisation, where exactly are they most likely to get in and how?

Cybersecurity Innovation Product of the Year

Malaysia Cyber Security Awards — recognising the most technically innovative cybersecurity product in the Malaysian market, judged by the national cybersecurity authority.

2024

AIBP Enterprise Innovation Award

Association for Information and Business Professionals — recognising HELIOS's contribution to enterprise-grade AI-driven security innovation across the ASEAN region.

2024

Cybersecurity Initiative of the Year — Malaysia

Asian Telecom Awards — recognising HELIOS as the leading cybersecurity initiative by a telecommunications operator in Southeast Asia.

Asian Telecom Awards 2025

Telecommunications Initiative Award

National Business Malaysia Awards — recognising ACFC HELIOS as the most significant technology initiative in the Malaysian telecommunications sector.

National Business Malaysia Awards
DESIGN PHILOSOPHY

AI that analysts can trust.

HELIOS embodies a human-in-the-loop approach. AI-driven insights are systematically validated by ACFC's cybersecurity analysts before any output is acted upon or reported.

Automated platforms that act without human validation produce two outcomes: missed threats (false negatives) and wasted analyst time (false positives). HELIOS eliminated false positives to near 0% by combining machine learning correlation with structured analyst review.

This approach also ensures explainability a requirement for enterprise governance, regulatory compliance, and board-level risk reporting that black-box AI platforms cannot satisfy.

See your organisation the way HELIOS sees it.

Request a live HELIOS demonstration. We'll show you what's currently visible about your organisation from the outside attack surface, dark web exposure, and any immediate risks in real time.

Request a HELIOS Demo →Speak to a Security Expert

Or email hello@axiatacfc.com

HELIOS is available as part of ACFC's managed security services or as a standalone engagement.

Global platform · AI-powered · Scalable intelligence platform

HELIOS

An AI-powered platform that transforms cyber intelligence, attribution & threat actor identification

HELIOS is ACFC's patent-granted, in-house built AI-powered threat attribution and attack intelligence platform built to defend over 2,000 public IP addresses, 600+ applications, 1,000 APIs, and a complex digital ecosystem across the region.

Request Demo
7b+
Leaked data records detected across the digital ecosystem
700+
Individual threat actor profiles tracked and attributed
<24h
Attack surface fully mapped (reduced from 2 weeks)
100+
Telegram & underground channels monitored continuously
Patented
HELIOS patent granted by MyIPO - MY-212304-A
WHAT IS HELIOS

See your organisation the way attackers do.

HELIOS is ACFC's in-house, patent-granted AI threat attribution and attack intelligence platform. It was built to solve the problem of defending over 2,000 public IP addresses, 600+ applications, 1,000 APIs, and a complex vendor ecosystem across 12 operating entities.

Existing tools operated in silos. Assessing risk exposure took weeks. So ACFC designed HELIOS as a unified platform that continuously maps attack surfaces, crawls the open, deep, and dark web, and correlates every finding with real adversary intelligence in real time.

The result: attack surface discovery in under 24 hours, and 115+ automated intelligence reports per week all validated by human analysts before any action is recommended.

Attack Surface Discovery

Continuously maps every externally visible asset IPs, subdomains, domains, APIs, open ports, SSL certificates, and email addresses to produce a complete picture of what attackers can see about your organisation. Updated in under 24 hours.

Dark & Deep Web Intelligence

Crawls 100+ Telegram channels, underground forums, and dark web marketplaces for leaked credentials, data dumps, threat actor chatter, and organisation-specific mentions.

Threat Attribution

Identifies and profiles the adversary groups behind attacks linking indicators of compromise to known threat actors from a database of 700+ profiles.

Correlated Attack Intelligence

Correlates findings across attack surface data, vulnerability intelligence, dark web mentions, and telemetry producing chains of exposure that show how a specific threat actor could exploit your specific environment.

IT · OT · IoT Coverage

Unlike most commercial platforms built for enterprise IT, HELIOS covers IT, OT (Industrial Control Systems, SCADA), and IoT environments.

CAPABILITIES

Everything attackers look for. Found first by HELIOS.

HELIOS covers every reconnaissance and intelligence-gathering technique a sophisticated adversary would use to profile, penetrate, and exploit your organisation. Each capability is automated and every output is validated by a human analyst.

Attack Surface Discovery - Full External Perimeter Mapping

The complete picture of what adversaries see before they attack. HELIOS automatically discovers and maps your entire external digital footprint in under 24 hours.

CORE CAPABILITY

Leaked Credentials Discovery

Monitors the dark web, underground marketplaces, and public data breaches for credentials tied to your domains. 7B+ records detected to date.

DARK WEB

GitHub / Code Repository Leaks

Scans public and exposed code repositories for hardcoded credentials, API keys, private certificates, and sensitive configuration files.

SOURCE EXPOSURE

Subdomain Discovery

Comprehensive subdomain enumeration to identify forgotten, test, or shadow IT subdomains that are exposed to the internet but not under active security management.

PERIMETER

Phishing Domain Detection

Generates and monitors potential phishing domain variants based on your brand name identifying domains registered by adversaries before they go live.

BRAND PROTECTION

API Leaks Discovery

Finds exposed Postman collections, Swagger specs, and public API endpoints leaking sensitive data, authentication tokens, and internal service architecture.

API SECURITY

Cloud Open Container Discovery

Identifies misconfigured cloud storage buckets and containers (AWS S3, Azure Blob, GCP) that are publicly accessible.

CLOUD MISCONFIGURATION

Threat Intelligence via Dark Web Crawling

Continuous monitoring of 100+ Telegram channels, dark web forums, and criminal marketplaces for organisation-specific mentions and threat actor activity.

100+ CHANNELS

Vulnerable Host Discovery

Identifies hosts in your external perimeter running known-vulnerable software versions, exposed management interfaces, and unpatched services.

CVE CORRELATION

IP Asset Discovery

Discovers all IP addresses associated with your organisation across cloud, on-premises, and co-location environments.

ASSET INTELLIGENCE

Service Enumeration & Port Scanning

Identifies all services running on externally accessible ports including non-standard ports, legacy protocols, and development services.

EXPOSURE MAPPING

Historic DNS Enumeration

Analysis of historical DNS records to identify previously registered subdomains, decommissioned services, and IP address history.

HISTORICAL INTELLIGENCE

Email Discovery

Enumerates email addresses associated with your domains across public and dark web sources identifying employee accounts exposed in third-party breaches.

IDENTITY EXPOSURE

Web Application Vulnerability Scanning

Automated scanning of internet-exposed web applications for OWASP Top 10 vulnerabilities, known CVEs, and common misconfigurations.

OWASP ALIGNED
WHY HELIOS IS DIFFERENT

Four things no other platform in the region does.

Most threat intelligence platforms aggregate feeds. HELIOS was built to answer a harder question: given what we know about the specific adversaries targeting this specific organisation, where exactly are they most likely to get in and how?

01

Attack Intelligence - Correlated Insights, Not Disconnected Findings

Most tools present vulnerabilities or dark web mentions as isolated lists. HELIOS adds a layer of correlation by linking security issues back to each subdomain with known threat actor behaviors. This correlation gives analysts the context needed to determine credible attack paths rather than working from disconnected data points.

→ Correlated intelligence vs. disconnected findings
02

Offensive Automation - Attack Surface Mapped in Under 24 Hours

The discovery that previously took a security team two weeks of manual work identifying every externally visible asset HELIOS does in under 24 hours, continuously. Not as a one-time snapshot, but as an ongoing live map.

→ Continuous vs periodic point-in-time scanning
03

Correlated to Your Environment - Intelligence That Means Something

Dark web intelligence that isn't linked to your specific assets is noise. HELIOS correlates underground intelligence leaked credentials, code repository leaks, API exposures, phishing domains directly against your organisation's actual digital footprint.

→ Organisation-specific vs generic threat feeds
04

Business Risk View - Attack Paths Scored by Likelihood & Impact

HELIOS doesn't produce a list of 300 medium-severity findings and leave you to work out what matters. It produces a risk-prioritised view of attack paths ranked by likelihood and business impact. Designed for CISO reporting and Board-level risk communication.

→ Business risk context vs. raw technical severity
AWARDS & RECOGNITION

Validated by independent industry authorities.

HELIOS has won four regional cybersecurity awards since launch each judged independently by industry bodies evaluating innovation, technical merit, and real-world impact.

Cybersecurity Innovation Product of the Year

Malaysia Cyber Security Awards — recognising the most technically innovative cybersecurity product in the Malaysian market, judged by the national cybersecurity authority.

2024

AIBP Enterprise Innovation Award

Association for Information and Business Professionals Enterprise Innovation Award — recognising HELIOS's contribution to enterprise-grade AI-driven security innovation across the ASEAN region.

2024

Cybersecurity Initiative of the Year — Malaysia

Asian Telecom Awards — Cybersecurity Initiative of the Year (Malaysia category), recognising HELIOS as the leading cybersecurity initiative by a telecommunications operator in Southeast Asia.

Asian Telecom Awards 2025

Telecommunications Initiative Award

National Business Malaysia Awards — recognising ACFC HELIOS as the most significant technology initiative in the Malaysian telecommunications sector.

National Business Malaysia Awards
DESIGN PHILOSOPHY

AI that analysts can trust.

HELIOS embodies a human-in-the-loop approach. AI-driven insights are systematically validated by ACFC's cybersecurity analysts before any output is acted upon or reported.

Automated platforms that act without human validation produce two outcomes: missed threats (false negatives) and wasted analyst time (false positives). HELIOS eliminated false positives to near 0% by combining machine learning correlation with structured analyst review.

This approach also ensures explainability a requirement for enterprise governance, regulatory compliance, and board-level risk reporting that black-box AI platforms cannot satisfy.

Continuous Automated Discovery

HELIOS scanning and crawling engines run continuously mapping attack surfaces, monitoring dark web channels, and correlating intelligence across all sources.

AI Correlation & Pattern Detection

Machine learning models identify patterns, link indicators, attribute findings to threat actors, and produce ranked attack path hypotheses.

Analyst Validation

ACFC's human analysts review every AI-generated finding confirming validity, adding operational context, and eliminating false positives before escalation.

Validated Intelligence Output

Findings reach your team as validated, prioritised, actionable intelligence not raw machine output. 115+ reports per week, 0% false positive rate.

see your organisation the way HELIOS sees it.

Request a live HELIOS demonstration. We'll show you what's currently visible about your organisation from the outside attack surface, dark web exposure, and any immediate risks in real time.

Or email hello@axiatacfc.com

HELIOS is available as part of ACFC's managed security services or as a standalone engagement.