Skip to main content

Attack events Hosted customers only

Note

The Attacks events view is for hosted customers.

If you are an on-premises customer, visit Attacks.

Attack events are any actions that unauthorized individuals or groups take to damage, disrupt, or gain illegal access to an application's systems, data, or functionality. Examples of attack events include:

  • SQL injection: An attacker inserts malicious code into your application's database queries to steal data or take control of your systems.

  • Cross-site scripting (XSS): An attacker injects malicious scripts into your application to steal user data or redirect them to malicious websites.

  • API attacks: An attacker exploits vulnerabilities in your APIs to gain unauthorized access to data or functionality.

Event data retention

Contrast keeps attack event data for up to a year. You can also:

  • Output to syslog

  • Set up a generic webhook

    A webhook receives data in a POST request only when a specified event occurs. When the webhook sees the event, it collects the data and sends it to the specified URL.

Tasks

In Contrast you can: