TL;DR
Supported data types | 3rd party detection | Hunters detection | IOC search | Search | Table name | Log format | Collection method |
---|---|---|---|---|---|---|---|
Salt Attackers | ✅ | salt_attackers | Snowflake direct | Vendor ingestion |
Overview
Salt Security is a cybersecurity company that specializes in API security. Its platform uses AI and machine learning to detect, monitor, and prevent threats targeting APIs, which are commonly exploited in modern web applications. Salt Security’s solution focuses on identifying malicious activities, such as data breaches, credential stuffing, and bot attacks, that can exploit vulnerabilities in API traffic. The platform provides real-time API threat protection, continuous monitoring, and automated risk mitigation to help organizations secure their APIs and ensure the integrity of their data and services.
Supported data types
Salt Attackers
Table name: salt_attackers
Salt Attackers logs are records generated by Salt Security’s platform that capture details of detected malicious activities targeting APIs. These logs track attackers' behaviors, such as unusual patterns in API requests, potential exploits, and security incidents that may indicate an active attack. The logs typically contain information such as IP addresses, request details, attack vectors, and any associated vulnerabilities or misconfigurations in the API. By analyzing these logs, security teams can gain insights into the tactics and techniques used by attackers, allowing them to take action to mitigate risks and prevent further exploitation of APIs.
Send data to Hunters
To connect Salt Security logs:
Contact Salt Security to enable data export to your Snowflake account used on Hunters.
Contact Hunters support to establish the connection.