Introduction

Protecting your organization from identity-based threats starts with better visibility.

🛡️ Welcome to SpyCloud Docs

SpyCloud delivers the world’s most actionable insights by operationalizing a wide range of underground data – including stolen credentials, session cookies, infostealer logs, PII, phishing infrastructure, botnet activity, and deep/dark web intelligence – to stop cybercrime before it impacts your business.

🙌 This docs site is your guide to unlocking the full potential of SpyCloud’s solutions – from automated detection to analyst-driven investigations.


🧭 What You’ll Find Here

  • Product overviews and onboarding guides
  • API reference and integration examples
  • Playbooks for investigations and fraud use cases
  • Enablement content for your SecOps, CTI, and fraud teams
  • Best practices for getting the most value from your SpyCloud solutions

🚀 Why It Matters

Identity is the new perimeter – and today’s adversaries are bypassing traditional defenses with malware, stolen cookies, and reused credentials.

SpyCloud flips the advantage by operationalizing underground data, giving your team the ability to:

  • Detect compromised users before they’re exploited
  • Attribute malicious behavior with high-confidence identity data
  • Uncover fraud, account takeovers, and third-party risk faster than ever

🔓 Unlock New Use Cases

Whether you're defending customers, employees, infrastructure – or all three – this docs site helps you:

  • Unblock technical challenges in integrating SpyCloud data
  • Explore advanced use cases like synthetic identity detection, insider threat correlation, and malware campaign attribution
  • Align SpyCloud’s capabilities with your organization’s goals

🚀 Solutions

Our holistic identity approach illuminates and eliminates hidden darknet exposures across employees, contractors, customers, and non-human accounts – and allows analysts and investigators to achieve deeper insights and faster outcomes than ever before possible.

🏢 Enterprise Protection

Reduce risk of account takeover (ATO), credential misuse, and ransomware by acting on verified identity exposures.

Includes:
  • Malware Exposure Remediation (Compass)
  • Employee ATO Prevention
  • Identity Guardians
  • VIP Guardian
  • Third-Party Insight

👥 Consumer Risk Protection

Safeguard customer accounts by detecting compromised credentials, high-risk sessions, and PII exposures before they become fraud or churn events.

Includes:
  • Consumer ATO Prevention
  • Consumer Session Identity Protection
  • Compromised Credit Card API
  • Continuous Dark Web Monitoring

🔍 Investigations

Accelerate cybercrime investigations with rich identity linking and exposure intelligence from a single platform.

Includes:
  • Investigations Module
  • Investigations API
  • IDLink API

🔗 Integrations

Automate identity threat detection and remediation across your existing security ecosystem.

Includes:
  • SpyCloud Connect hosted integration workflows for SIEM, SOAR, EDR, IdP, and other tools