Attack events
Note
The Attacks events view is for hosted customers.
If you are an on-premises customer, visit Attacks.
Attack events are any actions that unauthorized individuals or groups take to damage, disrupt, or gain illegal access to an application's systems, data, or functionality. Examples of attack events include:
SQL injection: An attacker inserts malicious code into your application's database queries to steal data or take control of your systems.
Cross-site scripting (XSS): An attacker injects malicious scripts into your application to steal user data or redirect them to malicious websites.
API attacks: An attacker exploits vulnerabilities in your APIs to gain unauthorized access to data or functionality.
Event data retention
Contrast keeps attack event data for up to a year. You can also:
A webhook receives data in a POST request only when a specified event occurs. When the webhook sees the event, it collects the data and sends it to the specified URL.
Tasks
In Contrast you can: