User Guide
Detecting Exposed Cyber Assets: Criminal IP ASM Use Case (2)
Attack Surface Management (ASM) refers to the continuous monitoring, analysis, and remediation of a company or organization’s attack surface. This helps companies prevent the potential exposure of cyber assets that [...]
What Is Cryptojacking: Examples and How to Prevent It?
As crypto mining has gained more popularity, cyberattackers are developing a method to attack their victims called cryptojacking. This method gained popularity in 2017, when several prominent corporations, such as Starbucks and Tesla, [...]
How to Install and Run the Criminalip-Volatility3 Plugins
This article covers how to use Volatility memory forensics with Criminal IP threat intelligence data. Learn how to install and run the Criminalip-Volatility3 plugins integrated with threat intelligence data. For [...]
STIX Vulnerability Analysis Using IP Intelligence: Analyzing Criminal IP Data With STIX (1)
This article covers how to use Criminal IP threat intelligence data in STIX vulnerability analysis. This article describes several cases representing and analyzing threat intelligence data from Criminal IP using [...]
Vulnerability Detection Using Attack Surface Management: Criminal IP ASM Use Case (1)
Attack Surface Management (ASM) is the proactive practice of identifying and managing the potential attack surface of an organization's IT assets to prevent and mitigate potential attacks by hackers. It is [...]
Detect Personal Information Leakage With OSINT Attack Surface Management
It has recently been confirmed in Korea that personal information, including an identity photo, resident registration number, address, and phone number of an individual who submitted an application form to [...]