Investigation Modules

The ThreatNG platform helps organizations manage digital risks and improve security posture through investigation modules. These modules cover all facets of external attack surface management, digital risk management, and security ratings providing comprehensive visibility into an organization's digital assets and security posture. They empower organizations of all sizes to identify and assess potential security vulnerabilities, proactively manage digital risks, benchmark security performance against industry peers, gain insight into their reputation, financial performance, and market sentiment, and assess the evolution of their online presence. Overall, providing a comprehensive and integrated approach to managing digital risks, thus giving organizations peace of mind and the confidence to operate in today's digital landscape.

  • Domain Intelligence for Digital Risk Protection and External Attack Surface Management

    Domain Intelligence

    Provides a comprehensive view of an organization's domain-related assets and security posture by analyzing DNS records, subdomains, certificates, IP addresses, exposed APIs and development environments, VPNs, applications, web application firewalls, vulnerabilities, domain name permutations, Microsoft Entra identification, and bug bounty programs. More

  • Source Code Exposures for Digital Risk Protection and External Attack Surface Management

    Sensitive Code Exposure

    PScans public code repositories for exposed sensitive information such as API keys, access tokens, cloud credentials, security credentials, configuration files, database exposures, application data exposures, activity records, communication platform configurations, development environment configurations, security testing tools, cloud service configurations, remote access credentials, system utilities, personal data, user activity, and mobile apps. More

  • Cloud Vulnerabilities and Exposures for Digital Risk Protection and External Attack Surface Management

    Cloud & SaaS Exposure

    Identifies and analyzes an organization's use of cloud services, including sanctioned and unsanctioned services, impersonations, open exposed cloud buckets, and various SaaS implementations across different categories like collaboration, CRM, customer service, communication, data analytics, endpoint management, ERP, HR, identity and access management, incident management, IT service management, project management, video conferencing, and work operating systems. More

  • Paste Sites Exposures for Digital Risk Protection and External Attack Surface Management

    Online Sharing Exposure

    Investigates an organization's presence on online code-sharing platforms like Pastebin, Gist, Scribd, and Slideshare, identifying potential data leaks and security risks. More

  • Sentiment Chatter Rumors News SEC Filings Lawsuits Layoffs Digital Risk Protection and External Attack Surface Management

    Sentiment and Financials

    Analyzes organizational sentiment and financial health by examining related lawsuits, layoff chatter, SEC filings (including risk and oversight disclosures, Form 8-Ks, and ESG violations) for publicly traded US companies. More

  • Web Archive Investigations for Digital Risk Protection and External Attack Surface Management

    Archived Web Pages

    Explores an organization's archived web pages, including various file types (API, BAK, CSS, etc.), directories, subdomains, usernames, and admin pages to uncover potential vulnerabilities and outdated information. More

  • Dark Web Reconnaissance Investigation Digital Risk Protection and External Attack Surface Management

    Dark Web

    Monitors the dark web for mentions of the organization, associated ransomware events, and compromised credentials, providing insights into potential cyber threats. More

  • Technology Stack Digital Footprint Digital Risk Protection and External Attack Surface Management

    Technology Stack

    Identifies the technologies used by the organization, including accounting tools, analytics platforms, API management solutions, blogging platforms, booking systems, CDNs, CMS, CRM, databases, developer platforms, digital content publishing tools, e-commerce platforms, email systems, helpdesk software, incident management systems, marketing automation tools, media platforms, operating systems, POS/retail management systems, privacy tools, project management software, security solutions, shipping tools, utilities, web servers, and website development frameworks. More

  • Search Engine Dorks Exposures Digital Risk Protection and External Attack Surface Management

    Search Engine Exploitation

    Assesses an organization's susceptibility to information leakage via search engines by examining exposed errors, advisories, IoT entities, persistent exploitation, sensitive information, privileged folders, public passwords, susceptible files and servers, user data, and web servers. More

  • Social Media Information for Digital Risk Protection and External Attack Surface Management

    Social Media

    Analyzes an organization's social media presence, including posts, hashtags, links, and tags to identify potential security risks and reputational issues. More