Skip to content
Nick Klein edited this page Sep 17, 2020 · 17 revisions

Welcome to the CyberCX Digger wiki

This wiki contains information about:

  • How CyberCX Digger works, and the threat intelligence it leverages
  • Why we produced CyberCX Digger, and how you can contribute to the project
  • The search techniques used, and the context of any results found
  • Conducting further investigation to validate results presented in the CyberCX Digger report
  • What to do if you believe your system may be compromised.

Please use the links on the right to navigate this wiki.

General advice for interpreting report findings

Threat Intelligence Sources

The Threat intelligence sources used to develop the detections withing CyberCX Digger include:

Interpreting the Results

Detections made by CyberCX Digger are based purely upon threat intelligence. If a scan returns findings, this does not itself mean that your system is compromised. Since all systems are different, further analysis should be performed to determine whether the finding is indeed proof of a compromise, or perhaps a false positive. Guidance for how to approach such analysis is provided within the wiki pages.

Please refer to the Detection Artefacts in the menu to the right for specific information and recommendations for each one.