Alerts from Assets
This topic describes the alerts that can be triggered from different asset types.
The following table lists which asset types produce which types of alerts:
| Asset Type | Alert Type | Alert Examples |
|---|---|---|
| Company names | Attack Indication | Hacking Tools, Product for Sale, Malicious impersonating applications, Bots for sale |
| Data Leakage | Confidential documents | |
| Brand Security | Impersonating applications, Fake company social media accounts | |
| Phishing | Suspected phishing domains | |
| VIP | Fake VIP social media accounts | |
| Brand names | Attack Indication | Hacking Tools, Product for Sale, Malicious impersonating applications, Bots for sale |
| Data Leakage | Confidential documents | |
| Brand Security | Impersonating applications, Fake company social media accounts | |
| Phishing | Suspected phishing domains | |
| VIP | Fake VIP social media accounts | |
| Domains | Attack Indication | Target lists, Hacking tools, Product for Sale, Domains reported on blacklists, Bots for sale |
| Data Leakage | Private details and Credentials leakage. To detect credentials leakage from subdomains, add them as separate assets. | |
| Brand Security | Twitter chatter | |
| Exploitable Data | Exposed services, SSL (certificate and server configurations), Exposed directory listings, DMARC/SPF | |
| Phishing | Suspected phishing domains | |
| VIP | Private details leakage, Executive credentials leakage, Executive on a target list | |
| Subdomains (discovered from domains) | Exploitable Data | Exposed services, SSL (certificate and server configurations) |
| Mobile & browser apps | Attack Indication | Malicious impersonating applications |
| Brand Security | Impersonating applications | |
| Mobile application name (discovered from Mobile & browser apps) | Attack Indication | Malicious impersonating applications |
| Brand Security | Impersonating applications | |
| Social media official pages | Brand Security | Fake social media accounts |
| External IP addresses | Attack Indication | Bots for sale |
| Exploitable Data | Open ports | |
| Login pages | Exploitable Data | Exposed services, SSL (certificate and servers configurations), Bots for sale |
| Technologies in use | Exploitable Data | Vulnerabilities |
| DLP indicators | Data Leakage | Confidential documents |
| Secret projects | Data Leakage | Confidential documents |
| VIP names | VIP | Fake VIP social media accounts |
| VIP emails | VIP | Target lists, Private details leakage |
| Countries of activity | All types | Regional alerts |
| Sectors | All types | Sectoral alerts |
| BIN numbers | Data Leakage | Credit cards leakage |
| Attack Indication | Credit cards for sale | |
| Routing numbers | Attack Indication | Financial fraud |
| SWIFT codes | Attack Indication | Financial fraud |
| Public repositories | Data Leakage | Leaked secrets on GitHub |
| Public repository queries | Data Leakage | Leaked secrets on GitHub |
| Code mentions | Data Leakage | Asset mentions on GitHub |
| Custom queries | All Types | All alerts |
| Black list | All Types | Eliminate specific results from the general scenarios |
| Patent drugs | Attack Indication | Drugs for sale |
| Brand name drugs | Attack Indication | Drugs for sale |