Malanta.ai
Go to website
Back
Articles on:Concepts & Methodology
Learn how Malanta.ai maps attack infrastructure and detects pre-attack activity.

Categories

  • Getting Started
  • Exposures & Threats
  • Features & Tools
  • Concepts & Methodology
  • FAQ
  • About Malanta
  • Cybersecurity Glossary
    Cybersecurity Glossary Category: Concepts & Methodology Attack Surface - The total set of points where an attacker could enter or extract data. In Malanta, this means all internet-facing assets: domains, subdomains, IPs, and certificates. Subdomain Takeover - A vulnerability where a subdomain points to a service that is no longer active. An attacker can claim that service and serve malicious content under your domain. Dangling DNS Record - A DNS record (typically CNAME)Few readers
  • Security Metrics That Matter
    Security Metrics That Matter Category: Concepts & Methodology Why Traditional Metrics Fall Short Security teams measure reaction speed: MTTD (Mean Time to Detect), MTTR (Mean Time to Respond). These all assume the attack is already happening. A SOC can resolve 1,000 alerts a week and still miss the domain an attacker registered yesterday. Malanta's New Metrics Exposure Correlation Index (ECI) How much of your external footprint overlaps with real adversary reconnaissancFew readers
  • Pre-Attack Prevention: How It Works
    Pre-Attack Prevention: How It Works Category: Concepts & Methodology The Problem: The Readiness Gap Traditional cybersecurity measures what happens after an attack begins. But every attack has a preparation phase that current metrics miss entirely: Reconnaissance - Attackers map your people, domains, cloud surfaces, and weak spots Infrastructure Setup - They register domains, spin up servers, configure email infrastructure Staging - They load phishing kits,Few readers
  • IoPA vs IoC: What's the Difference?
    IoPA vs IoC: What's the Difference? Category: Concepts & Methodology Indicators of Compromise (IoC) - Traditional When detected: After the attack What it shows: Evidence of compromise Action: Incident response Example: Malware hash found on endpoint Indicators of Pre-Attack (IoPA) - Malanta When detected: During attacker's preparation phase What it shows: Evidence of intent Action: Pre-emptive prevention Example: Phishing domaFew readers
  • 5 Questions Every CISO Should Ask About Pre-Attack Prevention
    5 Questions Every CISO Should Ask About Pre-Attack Prevention Category: Concepts & Methodology 1. Are we seeing intent before impact? Are we still relying on Indicators of Compromise that surface only after execution begins? Do our defenses detect Indicators of Pre-Attack (IoPAs) - such as malicious domain registrations, hosting activity, or cloned assets - while the attacker is still setting up? 2. Can we find and dismantle the infrastructure attackers build against us? DoFew readers

Not finding what you are looking for?

Chat with us or send us an email.

  • Chat with us
© 2026Malanta.ai