Investigation Modules
The ThreatNG platform helps organizations manage digital risks and improve security posture through investigation modules. These modules cover all facets of external attack surface management, digital risk management, and security ratings providing comprehensive visibility into an organization's digital assets and security posture. They empower organizations of all sizes to identify and assess potential security vulnerabilities, proactively manage digital risks, benchmark security performance against industry peers, gain insight into their reputation, financial performance, and market sentiment, and assess the evolution of their online presence. Overall, providing a comprehensive and integrated approach to managing digital risks, thus giving organizations peace of mind and the confidence to operate in today's digital landscape.
-
Domain Intelligence
Provides a comprehensive view of an organization's domain-related assets and security posture by analyzing DNS records, subdomains, certificates, IP addresses, exposed APIs and development environments, VPNs, applications, web application firewalls, vulnerabilities, domain name permutations, Microsoft Entra identification, and bug bounty programs. More
-
Sensitive Code Exposure
PScans public code repositories for exposed sensitive information such as API keys, access tokens, cloud credentials, security credentials, configuration files, database exposures, application data exposures, activity records, communication platform configurations, development environment configurations, security testing tools, cloud service configurations, remote access credentials, system utilities, personal data, user activity, and mobile apps. More
-
Cloud & SaaS Exposure
Identifies and analyzes an organization's use of cloud services, including sanctioned and unsanctioned services, impersonations, open exposed cloud buckets, and various SaaS implementations across different categories like collaboration, CRM, customer service, communication, data analytics, endpoint management, ERP, HR, identity and access management, incident management, IT service management, project management, video conferencing, and work operating systems. More
-
Online Sharing Exposure
Investigates an organization's presence on online code-sharing platforms like Pastebin, Gist, Scribd, and Slideshare, identifying potential data leaks and security risks. More
-
Sentiment and Financials
Analyzes organizational sentiment and financial health by examining related lawsuits, layoff chatter, SEC filings (including risk and oversight disclosures, Form 8-Ks, and ESG violations) for publicly traded US companies. More
-
Archived Web Pages
Explores an organization's archived web pages, including various file types (API, BAK, CSS, etc.), directories, subdomains, usernames, and admin pages to uncover potential vulnerabilities and outdated information. More
-
Dark Web
Monitors the dark web for mentions of the organization, associated ransomware events, and compromised credentials, providing insights into potential cyber threats. More
-
Technology Stack
Identifies the technologies used by the organization, including accounting tools, analytics platforms, API management solutions, blogging platforms, booking systems, CDNs, CMS, CRM, databases, developer platforms, digital content publishing tools, e-commerce platforms, email systems, helpdesk software, incident management systems, marketing automation tools, media platforms, operating systems, POS/retail management systems, privacy tools, project management software, security solutions, shipping tools, utilities, web servers, and website development frameworks. More
-
Search Engine Exploitation
Assesses an organization's susceptibility to information leakage via search engines by examining exposed errors, advisories, IoT entities, persistent exploitation, sensitive information, privileged folders, public passwords, susceptible files and servers, user data, and web servers. More
-
Social Media
Analyzes an organization's social media presence, including posts, hashtags, links, and tags to identify potential security risks and reputational issues. More