UpGuard CyberResearch

Learn how to use UpGuard CyberResearch with tutorials, onboarding tips, and team use cases

Abi Tyas Tunggal avatar Aaron Spiteri avatar Steve Cossell avatar +1
13 articles in this collection
Written by Abi Tyas Tunggal, Aaron Spiteri, Steve Cossell and 1 other
Data Leaks

What is Data Leaks?

Learn more about Data Leaks and how it can help you protect you and your customer's sensitive data.
Abi Tyas Tunggal avatar
Written by Abi Tyas Tunggal
Updated over a week ago

How to remove content from cloud storage buckets

Learn how to contact cloud providers like AWS, Google Cloud, and Microsoft Azure when data leaks occur in cloud storage buckets.
Greg Pollock avatar
Written by Greg Pollock
Updated this week

How to remove content from GitHub

Github has a process for initiating takedown requests that can be used to remove data leaks of sensitive information.
Greg Pollock avatar
Written by Greg Pollock
Updated over a week ago

How to get more information about or close a Data Leak finding

Learn how to ask for more information and acknowledge that a Data Leak finding has been fixed, accepted or ignored.
Aaron Spiteri avatar
Written by Aaron Spiteri
Updated over a week ago

How to notify MS Teams when a new Data Leaks finding is published

This guide allows your Engineers to set up a notification when a new Data Leak finding is published via MS Teams.
Steve Cossell avatar
Written by Steve Cossell
Updated over a week ago

What is Data Leaks Reporting?

Get insights into the performance of the set of keywords you have provided to the UpGuard Cyber Research team and review raw results.
Abi Tyas Tunggal avatar
Written by Abi Tyas Tunggal
Updated over a week ago

Why are there duplicate entries and related hits in Data Leaks Reporting?

Learn about how our team classifies hits, why duplicates can appear, and what related hits are in data leaks reporting.
Abi Tyas Tunggal avatar
Written by Abi Tyas Tunggal
Updated over a week ago

Why are some URLs redacted in Data Leaks Reporting?

Learn why our team redacts some URLs in our data leaks reporting feature.
Abi Tyas Tunggal avatar
Written by Abi Tyas Tunggal
Updated over a week ago