The Threats Table
This section contains no articles.
Filtering Threats
This section contains no articles.
Exporting Threats
This section contains no articles.
Threat Options
This section contains no articles.
Understanding the Threats List
Understanding the Threats List The Threats List is the central workspace where all exposed identities detected by Selki are displayed, organized, and managed. It provides a complete, real-time overview of every threat affecting your monitored domains, allowing your security team to quickly identify, filter, investigate, and act on compromised accounts. This page is designed to be fast, searchable, and intuitive, combining powerful filtering options with detailed exposure data. OSome readersThreat Findings Explained - Hostname, Password, Occurrences
The Findings section of the Threat Details panel provides the raw evidence behind a detected exposure. Each finding represents a unique piece of compromised data associated with the exposed identity, collected from infostealers, breaches, paste sources, or aggregated datasets. Understanding these fields is essential for evaluating the severity of the threat and determining the correct remediation steps. The three core elements shown in Findings are: Hostname PasswordFew readersExporting Threats (PDF, CSV, XLSX)
Exporting Threats (PDF, CSV, XLSX) Selki allows you to export threats for reporting, auditing, investigation, or integration with external tools. Exports can be generated in PDF, CSV, or XLSX format and can include the entire threat list or only specific filtered data. This article explains how exports work, what each format is best used for, and how to interpret export options. 1. Where to Export Threats The export control is available in the top-right corner ofFew readersHow to Resolve a Threat - Closing & Re-Opening
How to Resolve a Threat (Closing & Re-Opening) Resolving a threat in Selki is a key part of the identity exposure workflow. Closing or re-opening a threat helps your security team manage remediation progress, maintain visibility, and document actions taken on compromised accounts. Selki provides simple, structured controls for: closing a threat once remediation has been completed re-opening a threat when new information appears or additional work is required This articleFew readersThreat Details Page - Full Explanation
Threat Details Page (Full Explanation) The Threat Details panel provides an in-depth view of a compromised identity detected by Selki. It appears when you click on any identity in the Threats List and contains all relevant information needed for investigation and remediation. This page is divided into clear sections that help analysts understand the exposure quickly and take action efficiently. 1. Identity and Summary Information At the top of the details panel, you’llFew readersWatchers and Threats: How They Connect
Watchers and Threats: How They Connect In Selki, Watchers are the domains your organization chooses to monitor for exposed identities. Every threat detected in Selki is tied to a watcher, which defines its origin, ownership, and scope. Understanding the relationship between watchers and threats helps your security team manage risks at the domain level and prioritize remediation based on where exposures occur. 1. What Are Watchers? Watchers represent the domains monitoredFew readersBest Practices for Managing Threats in Selki
Best Practices for Managing Threats in Selki Managing identity exposures effectively is crucial to reducing the likelihood of account takeover, fraud, or unauthorized access within your organization or platform. Selki provides powerful tools to detect, triage, and remediate leaked credentials — and following best practices ensures that your team uses these capabilities to their full potential. This article summarizes recommended workflows, priorities, and operational habits for securiFew readersThreat Types & Sources (Infostealer, Breach, Paste, etc.)
Threat Types & Sources (Infostealer, Breach, Paste, etc.) Selki classifies threats based on where an exposed identity was found and how the data was compromised. Understanding exposure types helps your security team evaluate urgency, investigate context, and prioritize remediation according to real-world risk. Below are the primary threat types and sources detected by Selki. 1. Infostealer Malware Infostealers are one of the most dangerous and active sources ofFew readersThreat Risk Levels (Low, Medium, High, Critical)
Threat Risk Levels (Low, Medium, High, Critical) Every threat detected in Selki is assigned a Risk Level, which represents the potential impact and urgency of the exposure. Risk levels help security teams prioritize which compromised identities require immediate action and which can be reviewed with lower urgency. The four severity levels in Selki are: Low Medium High Critical These appear in both the Threats List and the threat filters. How Selki DetSome readersThreat Statuses (Open, Re-Opened, Closed)
Threat Statuses (Open, Re-Opened, Closed) Each threat in Selki has a status that reflects where it stands in your investigation and remediation workflow. Understanding these statuses ensures that security teams can track progress, prioritize exposures, and maintain clear operational visibility. Selki uses three statuses: Open Re-Opened Closed These states are shown both in the Threats List and inside each individual threat’s details panel. 1. Open ThreatsSome readersUsing Filters in the Threats List
Using Filters in the Threats List Filters allow you to refine and organize large volumes of exposed identities with precision. In the Threats List, filters appear on the left sidebar and operate instantly, updating the main table as selections are made. This helps your security team quickly focus on the exposures that matter most. Available Filters The left-side filtering panel contains several filter groups: 1. Status Filter threats based on their remediation workfFew readers