Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

69 total results found

Content alerts

Nimbusec KB Understand Nimbusec Results And Alerts

Defacement Websites are the most public representation of any modern enterprise. This combination of high publicity with complex technology makes websites a prime target for political hacktivists who aim to embarrass a company and cause as much damage as poss...

Incident Response - Website Cleanup

Nimbusec KB Guides

Table of Contents About It may happen that your website got hacked - spreads malicious files or was defaced or is suddenly blacklisted. This guide tells you the steps what you should do to get your systems up and running again and also support investigations...

Fading out results

Nimbusec KB Understand Nimbusec Results And Alerts

An issue will be faded out when it is not seen again in between 2 weeks. This keeps your domain dashboard clean.

Server side alerts

Nimbusec KB Understand Nimbusec Results And Alerts

Malware Definition Malware is short for "malicious software". In Nimbusec, malware usually refers to viruses, worms, trojan horses, Java script exploits and many other types of software that aim to compromise a website visitor's computer. How is it detected...

Reputation Alerts

Nimbusec KB Understand Nimbusec Results And Alerts

Suspicious Redirects What is it? A suspicious redirect is a redirect that has changed. Redirects are tracked with each scan, and if the redirect chain changes e.g. to a malicious website, or doesn't match the expected pattern a warning for suspicious behavio...

GDPR Export Description

Compliance Monitor GDPR Export Description

General Information The GDPR export contains all collected information/results of the performed GDPR scan(same information as in the Nimbusec compliance monitor).Information is split in 4 main categories Inputs Cookies Tracker [Content] (optional) Al...

Nimbusec WSM - Available Data

Nimbusec KB Integration Projects

This page provides an overview of available data fields that can (partly already, partly to be implemented if required) passed on via our custom integrations within Website Security Monitor. Current Webhook Format Customer id Identifier to query addi...

Issue and Event overview

Nimbusec KB Understand Nimbusec Results And Alerts

Nimbusec Website Security Monitor Issue Types 2022 Category Issue Types Descritpion Malware Malware Malicious code fragments are found on a Web page. Typical examples would be, amongst others, credit card skimmers, crypto miners or tec...

Agent Configuration

Nimbusec KB Server Agent

This how-to describes the manual configuration of the Server Agent Known Limitation Please note: The upload size of the analysis result is limited to 750MB. To ensure consistency of results, the data will not be analysed if the limit is exceeded. All errors of...

Docker Image

Nimbusec KB Server Agent

Nimbusec Server Agent Docker Image This docker image is intended for use with the Website Security Monitor by KSV1870 Nimbusec (https://nimbusec.com). Use of this image requires an active subscription to Website Security Monitor. This image is published under ...

Two factor authentication

Nimbusec KB FAQ

First you have to click on your username in the top right corner and select the "Change password" function. Here you have the option to choose between 3 possibilities to activate the two-factor authentication. If you want to choose option 3 “Text M...

Sync domains in a hosting environment automatically

Nimbusec KB Guides

Use Case: If you are a hoster you probably want to synchronize available domains with nimbusec automatically. Tools to use: nimbusec sync-domains script nimbusec create-agent-configuration script Steps: Download the nimbusec agent from the nimbuse ...

Discovery Webhooks

Nimbusec KB Integrations

Overview Webhooks allow you to build or set up applications which subscribe to new reports in your Discovery account. When a new report was generated, we'll send a HTTP POST payload to the webhook's configured URL. Webhooks can be used to update an ex...

Nimbusec Webhooks

Nimbusec KB Integrations

Overview Webhooks allow you to build or set up applications which subscribe to certain alerts in your Nimbusec account. When one of those alerts is triggered, we'll send a HTTP POST payload to the webhook's configured URL. Webhooks can be used to update an ex...

Plesk - Nimbusec Webhosting Security

Nimbusec KB Integrations

This how-to guide describes the usage of the Nimbusec Webhosting Security Plugin for Plesk. Installation & Uninstallation There are two ways on how the manage the installation and uninstallation of the Plesk plugin. Manage through Plesk extension store For...

Häufig gestellte Fragen

CyberRisk Rating Allgemeine Informationen

Kontaktdaten für Fragen: KSV1870 Nimbusec GmbH office@nimbusec.com +43 (732) / 860 626 Kaisergasse 16b, 4020 Linz Inhaltsverzeichnis Welche Vorteile haben Kunden? Was kostet das CyberRisk Rating von KSV1870? Wo kann das CRR verwendet werden? Warum e...

Über uns

CyberRisk Rating Allgemeine Informationen

Inhaltsverzeichnis Allgemeines Für kritische Infrastrukturen & Unternehmen Für bewertete Unternehmen Allgemeines Das CyberRisk Rating von KSV1870 wurde im Jahr 2020 entwickelt. Das Konzept wurde vom Kompetenzzentrum Sicheres Österreich in Zusammenar...

Überprüfung der PDF-Integrität

CyberRisk Rating Allgemeine Informationen

Inhaltsverzeichnis Integritätsprüfung über die Befehlszeile CyberRisk Rating Signature Public Key Das Cyber Risk Rating Portal stellt am Ende des Bewertungsprozesses für jeden Lieferanten mehrere Dokumente aus. Dazu gehören unter anderem das Cyber Ris...

Risikomatrix bearbeiten

CyberRisk Rating Risikominimierung

Um die Risikomatrix zu bearbeiten, klicken Sie auf "Risikomatrix bearbeiten". Um die Risikomatrix an die eigne individuelle Lage anzupassen, klicken Sie in die Textfelder um den Text passend zu konfigurieren.  

Risiko-Massnahmen

CyberRisk Rating Risikominimierung

Um Maßnahmen für das Risikomanagement Ihrer Lieferanten zu hinterlegen klicken Sie auf "Massnahmen". Um eine Sicherheitsmassnahme hinzuzufügen klicken Sie auf das "+". Hier können Sie für das jeweilige Risiko, die für Sie passende Massnahme setzen.  ...