Detections 1.0.0

We are happy to publish our first set of Detections.

New Detection Capabilities in Our Monitoring Tools

We're excited to announce a significant upgrade to our suite of monitoring tools designed to enhance the security and integrity of your digital assets. Our latest rollout includes new checks that encompass a wide range of file types and configurations, aimed at identifying potential vulnerabilities before they can be exploited.

Enhanced Configuration File Checks

Configuration files are often targeted by attackers due to their sensitive content and critical role in system operations. Our new set of checks includes:

  • YAML and YML Files: Monitoring `/config.yml` and `/config.yaml` files, ensuring they do not exceed 500 KB to prevent bloating and potential manipulation.
  • PHP Configuration Files: The `/config.php` files, often containing sensitive PHP settings, are now checked for specific content markers , capping at 500 KB.
  • Web and Database Configuration: High-impact checks for `/web.config` and SQL dump files like `/dump.sql`, `/backup.sql`, and `/database.sql` to monitor SQL commands and database directives within a 5 MB size limit.
  • WordPress Configuration: Reinforced monitoring of WordPress configuration and setup files, including `wp-config.php` and `wp-admin/setup-config.php`.

Database Integrity and Security

Maintaining the integrity of database backups and configurations is crucial for data security. Our enhanced checks include:

  • SQL Content Monitoring: Scrutinizing SQL dump files for potential exposures of structure and data insertion commands.

Source Code and Version Control

Source code and version control systems can be avenues for information leaks if not properly secured. To address this, we've added:

  • Archive Files and Version Control Systems: Checks on archive files such as `/backup.zip` and `/backup.tar.gz`, along with Git HEAD files in `/.git/HEAD`.

Sensitive Credential Protections

Credentials stored in system files are a prime target for cyber threats. Our system now includes checks for:

  • SSH Private Keys: Files such as `/.ssh/id_ed25519`, `/.ssh/id_ecdsa`, and `/.ssh/id_rsa` are monitored closely to ensure they contain private keys and do not exceed 50 KB.

This rollout reflects our commitment to providing robust, comprehensive monitoring solutions that safeguard your digital infrastructure against evolving security threats. By continuously expanding our detection capabilities, we ensure that our tools remain effective in the dynamic landscape of cybersecurity threats.

You're already a customer?
Use our tool to watch the stream.

You can use our tool to watch the stream of security issues. Just enter your API key and you're ready to go.