Advanced Search
Search Results
77 total results found
Content alerts
Defacement Websites are the most public representation of any modern enterprise. This combination of high publicity with complex technology makes websites a prime target for political hacktivists who aim to embarrass a company and cause as much damage as poss...
Incident Response - Website Cleanup
Table of Contents About It may happen that your website got hacked - spreads malicious files or was defaced or is suddenly blacklisted. This guide tells you the steps what you should do to get your systems up and running again and also support investigations...
Fading out results
An issue will be faded out when it is not seen again in between 2 weeks. This keeps your domain dashboard clean.
Server side alerts
Malware Definition Malware is short for "malicious software". In Nimbusec, malware usually refers to viruses, worms, trojan horses, Java script exploits and many other types of software that aim to compromise a website visitor's computer. How is it detected...
Reputation Alerts
Suspicious Redirects What is it? A suspicious redirect is a redirect that has changed. Redirects are tracked with each scan, and if the redirect chain changes e.g. to a malicious website, or doesn't match the expected pattern a warning for suspicious behavio...
GDPR Export Description
General Information The GDPR export contains all collected information/results of the performed GDPR scan(same information as in the Nimbusec compliance monitor).Information is split in 4 main categories Inputs Cookies Tracker [Content] (optional) Al...
Nimbusec WSM - Available Data
This page provides an overview of available data fields that can (partly already, partly to be implemented if required) passed on via our custom integrations within Website Security Monitor. Current Webhook Format Customer id Identifier to query addi...
Issue and Event overview
Nimbusec Website Security Monitor Issue Types 2022 Category Issue Types Descritpion Malware Malware Malicious code fragments are found on a Web page. Typical examples would be, amongst others, credit card skimmers, crypto miners or tec...
Agent Configuration
This how-to describes the manual configuration of the Server Agent Known Limitation Please note: The upload size of the analysis result is limited to 750MB. To ensure consistency of results, the data will not be analysed if the limit is exceeded. All errors of...
Docker Image
Nimbusec Server Agent Docker Image This docker image is intended for use with the Website Security Monitor by KSV1870 Nimbusec (https://nimbusec.com). Use of this image requires an active subscription to Website Security Monitor. This image is published under ...
Two factor authentication
First you have to click on your username in the top right corner and select the "Change password" function. Here you have the option to choose between 3 possibilities to activate the two-factor authentication. If you want to choose option 3 “Text M...
Sync domains in a hosting environment automatically
Use Case: If you are a hoster you probably want to synchronize available domains with nimbusec automatically. Tools to use: nimbusec sync-domains script nimbusec create-agent-configuration script Steps: Download the nimbusec agent from the nimbuse ...
Discovery Webhooks
Overview Webhooks allow you to build or set up applications which subscribe to new reports in your Discovery account. When a new report was generated, we'll send a HTTP POST payload to the webhook's configured URL. Webhooks can be used to update an ex...
Nimbusec Webhooks
Overview Webhooks allow you to build or set up applications which subscribe to certain alerts in your Nimbusec account. When one of those alerts is triggered, we'll send a HTTP POST payload to the webhook's configured URL. Webhooks can be used to update an ex...
Plesk - Nimbusec Webhosting Security
This how-to guide describes the usage of the Nimbusec Webhosting Security Plugin for Plesk. Installation & Uninstallation There are two ways on how the manage the installation and uninstallation of the Plesk plugin. Manage through Plesk extension store For...
Häufig gestellte Fragen | Frequently asked questions
English version down below Kontaktdaten für Fragen: KSV1870 Nimbusec GmbH | office@nimbusec.com | +43 (732) / 860 626 | Kaisergasse 16b, 4020 Linz Inhaltsverzeichnis Welche Vorteile haben Kunden? Was kostet das CyberRisk Rating von KSV1870? Wo kann ...
Über uns | About us
English version down below Inhaltsverzeichnis Allgemeines Für kritische Infrastrukturen & Unternehmen Für bewertete Unternehmen Allgemeines Das CyberRisk Rating von KSV1870 wurde im Jahr 2020 entwickelt. Das Konzept wurde vom Kompetenzzentrum Siche...
Überprüfung der PDF-Integrität | Verification of PDF Integrity
English version down below Inhaltsverzeichnis Integritätsprüfung über die Befehlszeile CyberRisk Rating Signature Public Key Das Cyber Risk Rating Portal stellt am Ende des Bewertungsprozesses für jeden Lieferanten mehrere Dokumente aus. Dazu gehören...
Risikomatrix bearbeiten | Edit risk matrix
English version down below Um die Risikomatrix zu bearbeiten, klicken Sie auf "RISIKOMATRIX BEARBEITEN" Um die Risikomatrix an die eigne individuelle Lage anzupassen, klicken Sie in die Textfelder, um den Text passend zu konfigurieren Englis...
Maßnahmen | Measures
English version down below Um Maßnahmen für das Risikomanagement Ihrer Lieferanten zu hinterlegen, klicken Sie auf "Maßnahmen" Um eine Sicherheitsmaßnahme hinzuzufügen, klicken Sie auf das "+" Hier können Sie für das jeweilige Risiko, die für Sie ...