The Hack Monitor is an essential feature of our Breach Defence product.

It allows you to monitor your domains for potential Website Malware that your webpage may be attacked with – this way you can find out about the threat and react quickly – before the damage by unwanted software is done.

Hack Monitor also allows you to check for any Hacker Mentions related to your company.
We scrape the Dark Web in order to find any chatter between the hackers or any leads that could potentially turn into attacks on your company, staff or any of your sensitive data.

Here is a quick guide on how to navigate through the Hack Monitor.

On your Dashboard choose the Hack Monitor tab either from the center menu or from the navigation menu on the left-hand-side of the screen.

 

On the next screen you will be able to see all the Assets monitored by our Hack Monitor.
Next to each asset you can find information about the number of Website Malware and Hacker Mentions that have been found, when the most recent scan occurred, the status of it and a “more info” button which will transfer you to a page with more detailed information about data found for each asset.

 

 

Next screen is divided into 2 sections:

  1. Website Malware
  2. Hacker Mentions

 

Website Malware section provides the information found by us regarding the presence of any malware or social engineering actions that may threat your website.

 


 Here you can find:

  1. Date when the threat has been found
  2. Source of the threat
  3. Type of the threat (click “Threat Types Info” on the right side to view more info about threats)

       d. Website where the threat has been found


Hacker Mentions section shows you the results regarding hacker chatter and their plans to hack/infect your assets in order to steal sensitive data from you.

 

In this tab you can find:

  1. Date of the action
  2. Source of the action (hacker tool/data source/hacker chatter)
  3. The Stage of the attack (click the “Attack Stages Info” button to learn more)

       4. Target Application.


By clicking the “eye”  icon next to all that information you can view information on how to act regarding this threat and a reference link to where the vulnerability occurs.