Skip to main content

Advanced Hacker Insights: With great power comes great responsibility

You may have noticed that you have access to advanced insights. Here's how to read them, some capabilities, and some limitations to guide you.

Updated over a week ago

1. From the Home page, navigate to The Cyber Questionnaire Validator.

2. Double click to select an entity and view results.

3. The Hacker Threat Analysis is complete, so advanced insights are available when you scroll to the bottom of the page.

4. For advanced insights, show advanced hacker threat analysis for detailed BreachRisk™ AI findings.

5. You can also toggle Show Advanced Insights to display hacker insights by default.

6.

Review the Hacker's Plan of Attack for risk breakdown by attack vector.

These are the attack pathways that real attackers are planning to use. Some are more dangerous than others...

7. Hackers compare entities and tend to attack those that are easier to attack with higher impact.

8. Hackers care most about attack pathways that are Verified, with evidence that the pathway is not blocked by defenses.

9.

Legacy cyber tools often alert to "false positives."

A false positive is an observation that a regular defender would assume is a valid problem, but where a hacker knows that it can't be used to launch an attack. Perhaps because a security control is successfully defending it.

We show you these false positives and mark them, "Verified False" so that you know it should not be considered into your decision.

10. From the hacker's point of view, there are plenty of good reasons to say "Yes" to this applicant.


Did this answer your question?