Event-Types

Articles

Malware Events
Malware events are available to customers who have purchased RiskIQ Enterprise Digital Footprint ( view product description ). They alert customers to any malware being hosted, linked to, or embedded on a site in their RiskIQ inventory. Each event ...
Defacement Events
Defacement events are available to customers who have purchased RiskIQ Enterprise Digital Footprint ( view product description ). They alert customers to any sites within their inventory that have been defaced by hackers. When a defaced site i...
Resource Events
Resource events are available to customers who have purchased RiskIQ JavaScript Threats ( view product description ). They alert customers to newly added or changed dependent resources within covered asset sites that are malicious, suspicious, or co...
Phish Events
Phish events are available to External Threats customers. They alert customers to phishing pages targeting their brands and customers.  RiskIQ ingests millions suspected phishing URLs every day from a broad range of sources including third-p...
Domain Infringement Events
Domain Infringement events are available to External Threats customers. They alert customers to third party-owned domain and subdomains names that are confusingly similar to branded terms or trademarks. This is a common way for threat actors to sp...
Rogue Mobile App Events
Rogue Mobile App Events Rogue Mobile App events are available to External Threats customers. They alert customers to mobile applications violating their configured mobile policy, including unapproved versions or download locations of mobile apps ...
Social Events
Social events are available to External Threats and/or Executive Guardian customers . They alert customers to unauthorized social profiles claiming to represent their brand in the case of External Threats and/or an executive or employee of the o...
Content Events
Content events are used for classifying a wide range of general webpages and content that are not specifically treated as suspected phish, customer-owned websites, social media profiles, or mobile app stores to analyze against the configured policy....
Custom Events
Custom events are available to External Threats as well as Executive Guardian or Tailored Intelligence customers, depending on the use case. Their purpose is provide a flexible way to track any pieces of information that don't fit into an ...