Workforce Threat Protection
VISIBILITY INTO EXPOSED EMPLOYEE CREDENTIALS AND MALWARE-DRIVEN IDENTITY THREATS
Overview
Workforce Threat Protection continuously monitors recaptured data from the criminal underground — including third-party breaches, infostealer malware records, combo lists, and successful phishing campaigns — and matches that data against assets you define. When employee credentials are exposed, SpyCloud surfaces the records, context, and metadata needed for investigation.
This product helps security teams understand what criminals already know about their workforce identities — and where that exposure may introduce risk.
🔎 What Workforce Threat Protection Monitors
Workforce Threat Protection identifies exposure tied to:
- Corporate email domains
- Individual employee email addresses
- Organizational IP addresses
These identifiers are configured in your watchlist. Once added and verified, SpyCloud continuously matches them against newly recaptured data, as well as historical datasets (backfill where available).
Matched records may include:
- Exposed usernames and passwords from third-party breaches
- Credentials circulating in combo lists traded in underground markets
- Stolen credentials and browser data from infostealer malware infections
- Data captured through successful phishing campaigns
All matched records are surfaced in structured views to support filtering, investigation, and export.
⚙️ How It Works
1️⃣ Define your watchlist
Add corporate domains, employee email addresses, and IP addresses associated with your organization.
2️⃣ SpyCloud matches against recaptured data
Identifiers are continuously matched against recaptured breach data, malware logs, combo lists, and phished data collected from the criminal underground.
3️⃣ Records are pre-associated at ingestion
Matching occurs during data processing. Records tied to your identifiers are linked to your organization and made available in the console.
4️⃣ Investigate and analyze exposure
Use dashboards, filters, and record views to analyze exposure trends, prioritize high-severity records, and export data for downstream workflows.
📊 What You’ll See
Overview Dashboard
High-level metrics and trend analysis, including:
- Exposed employee counts
- Infected employee counts
- Password reuse rates
- Total matched records
- Exposure timelines
- Most recent matches
Use this view to monitor changes in workforce exposure over time.
All Records View
A searchable, filterable dataset of all matched records associated with your watchlist identifiers.
From this view, you can:
- Filter by record type, severity, source, identifier, and date range
- Search across identifiers and source titles
- Open record detail drawers to review full exposure context
- Export filtered datasets
Recent Records
A triage-focused view of newly ingested or recently updated records.
Records are categorized by status (New, Updated, Dismissed) to help teams track remediation progress.
Exports
Flexible export options allow you to download filtered datasets for internal workflows, reporting, or integration with external tools.
🧩 Understanding the Data
Workforce Threat Protection surfaces multiple types of exposure records, each reflecting a different method of credential compromise.
To understand:
- Record types (Corporate, Infected Employee, Infected User)
- Source types (Breach, Malware, Combolist, Phished)
- Severity scoring
- Watchlist behavior
See:
- Data Model & Record Types
- Watchlist Management
These guides explain how records are structured and how data is associated with your organization.
Updated about 4 hours ago