Malanta.ai
Go to website
Back
Articles on:Exposures & Threats
Understand vulnerabilities, threat indicators, and how to prioritize remediation.

Categories

  • Getting Started
  • Exposures & Threats
  • Features & Tools
  • Concepts & Methodology
  • FAQ
  • About Malanta
  • Dismissing Exposures
    Dismissing Exposures Category: Exposures & Threats If an exposure is not relevant or is a false positive, you can dismiss it. Dismiss Reasons Already Fixed - You've resolved the issue outside of Malanta Not an Exposure - It's a false positive (the detected issue isn't actually a vulnerability) Ignore (Will Not Fix) - You've accepted the risk and chosen not to remediate Other - A custom reason you can describe Dismiss Scope When dismissing, you canFew readers
  • Business Impact Categories
    Business Impact Categories Category: Exposures & Threats Each exposure may include a business impact assessment describing what could happen if the vulnerability is exploited: Operational Disruption - Could disrupt business operations or service availability. Reputation Damage - Could harm the organization's public image or brand trust. Financial Losses - Could result in direct financial damage. Legal and Regulatory Consequences - Could lead to complianceFew readers
  • What is an Exposure?
    What is an Exposure? Category: Exposures & Threats An exposure is a discovered vulnerability or weakness in your external attack surface. Each exposure represents something that an attacker could potentially exploit - a misconfigured DNS record, a leaked credential, an expired certificate, or a subdomain that can be taken over. Exposure Data Fields Every exposure includes: Exposure Type - The category of vulnerability (e.g., "Subdomain Takeover", "Invalid SSL CertificateFew readers
  • Imminent Threats vs Regular Exposures
    Imminent Threats vs Regular Exposures Category: Exposures & Threats What's the Difference? Exposures are vulnerabilities that exist in your attack surface - things like misconfigured DNS, expired certificates, or leaked data. They represent things that could be exploited. Imminent Threats are a subset of exposures where there's evidence that attackers are actively preparing to exploit them. They mean an attacker is not just aware of the vulnerability but is activFew readers
  • How to Filter and Search Exposures
    How to Filter and Search Exposures Category: Exposures & Threats The Exposures page lets you filter and search to find specific vulnerabilities quickly. Available Filters Asset Type - Registered Domain, Subdomain, IP Address, Certificate Status - Exposed, Hijacked, Spoofed, Impersonated, Invalid, Prevented Exposure Type - The category of vulnerability Potential Impact - The business impact category Exposure Scenario - The specific scenario typeFew readers

Not finding what you are looking for?

Chat with us or send us an email.

  • Chat with us
© 2026Malanta.ai