User Guide
Vulnerability Detection Using Attack Surface Management: Criminal IP ASM Use Case (1)
Attack Surface Management (ASM) is the proactive practice of identifying and managing the potential attack surface of an organization's IT assets to prevent and mitigate potential attacks by hackers. It is [...]
Detect Personal Information Leakage With OSINT Attack Surface Management
It has recently been confirmed in Korea that personal information, including an identity photo, resident registration number, address, and phone number of an individual who submitted an application form to [...]
Using OSINT Search Engines To Collect Cyber Threat Intelligence
OSINT (Open Source Intelligence), refers to the intelligence information collected and analyzed from publicly available sources. The internet itself is a huge big data platform and a space of collective [...]
Criminal IP, Splunk Integrated FDS App Released
If you are a Criminal IP and Spunk user, here's good news! The Criminal IP and Splunk integrated app that integrates the log analysis platform Splunk dashboard and the Criminal IP [...]
IP Intelligence: How to Handle IP Addresses That Attempt to Bypass Anti-spam Solutions
To stop spam emails, it is common for companies to implement several anti-spam solutions, such as spam filters, in their mail servers. Nevertheless, there are many cases where anti-spam solutions are [...]
Attack Surface Management: Monitoring Unknown Assets and Vulnerabilities
It is well-known that most companies utilize various network equipment, databases, applications, and domains and that these IT properties often operate under a myriad of IP addresses and ports. Hackers with [...]