Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • User Manual
  • Dark Web

Dark Web Monitor Results

The Dark Web Monitor Results page provides comprehensive insights into potential data breaches and exposures across dark web sources. The new interface offers enhanced visualization and categorization of findings to help security teams quickly identify and respond to threats.

Written by Noah Garland

Updated at March 20th, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More

Table of Contents

Dashboard Overview Breach Type Forums/Marketplaces Breach Data Analysis Total Number of Breaches Highest Category & Most Dangerous Data Visualization Breach Type Distribution Breaches by Category Detailed Breach Results Table Components Taking Action Using the Dashboard Effectively

Dashboard Overview

The Dark Web Monitor Results dashboard presents threat information in an organized, visual format with two main categories:

Breach Type

  • Displays the total number of breach incidents detected
  • Provides a quick overview of the breach severity

Forums/Marketplaces

  • Shows mentions of your monitored assets in dark web forums and marketplaces

Breach Data Analysis

Total Number of Breaches

  • Displays the cumulative number of breaches detected
  • Serves as a key metric for overall dark web exposure

Highest Category & Most Dangerous

  • Indicates the most prevalent type of breach affecting your organization
  • "Most Dangerous" highlights critical exposures requiring immediate attention

Data Visualization

Breach Type Distribution

  • Interactive donut chart showing the proportion of different breach types
  • Color-coded legend identifying:
    • Username (gray)
    • Password (blue)
    • Name (light blue)
    • Phone (purple)
    • Location (pink)
    • IP Address (light blue)

Breaches by Category

  • Bar graph visualization showing the volume of breaches by type
  • Other categories shown: Name, Location, Username, Phone, and IP Address
  • Provides visual indication of where security efforts should be focused

Detailed Breach Results

The "Breach Result - All" section provides a detailed breakdown of all detected breaches:

Table Components

  • Victim Account: Lists affected email addresses from your domain
  • Number of Findings: Quantifies how many times each account appeared in breaches
  • Last Seen: Timestamp of when the breach data was most recently observed

Taking Action

The Report Builder button in the top-right corner allows security teams to:

  • Generate comprehensive reports about dark web exposures
  • Document incidents for compliance and management review
  • Track remediation efforts over time

Using the Dashboard Effectively

  1. Prioritize by volume: Address password breaches first as they represent the highest volume
  2. Focus on accounts with multiple findings: Accounts appearing multiple times may indicate targeted attacks
  3. Review recent findings: Check the "Last Seen" dates to identify ongoing or recent exposures
  4. Implement targeted controls: Use category information to enhance specific security controls (password policies, MFA, etc.)
  5. Generate reports: Use the Report Builder to document findings and remediation plans

The Dark Web Monitor Results dashboard provides security teams with actionable intelligence to identify, prioritize, and remediate potential data exposures before they can be exploited.

 
underground web surveillance dark web monitor results dark web

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How to setup a Dark Web Monitor
  • Where Do I Find Logs to Troubleshoot the CYRISMA Agent?

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand