Product Update

Enhanced Credential Exposure Dashboard

Discover how the updated ‘My Credential Exposure’ dashboard provides more detailed information on credential breaches, with new features for analyzing and visualizing infostealer data.

Table Of Contents

What’s new

The My Credential Exposure dashboard, within the Flashpoint Ignite platform, now provides more comprehensive and actionable insights into your organization’s credential security posture with the following key enhancements:

  • Detailed Credential Table:
    • Comprehensive details on affected domains, IP addresses, and machine information related to credential hits.
    • Includes a freshness indicator to help prioritize responses.
  • Comparison Tile
    • A new visual comparison tile that distinguishes between username and email hits, making it easier to identify where threats are originating.
  • Enhanced Filtering
    • New filters allow for granular data analysis by IP address, machine user, machine OS, and credential-stealing malware.

Why it matters

The rise in infostealer malware is a critical concern for organizations in 2024. According to Flashpoint’s CTI Index: 2024 Midyear Report, infostealers have infected over 13 million devices and compromised more than 53 million credentials. This stolen data is a primary vector for ransomware and other high-impact breaches.

With such a pervasive threat landscape, the enhanced My Credential Exposure dashboard provides actionable intelligence that helps organizations identify, analyze, and respond to these threats more effectively, minimizing potential damage. Here’s how the new capabilities help:

Enhanced Visibility into Credential Theft

The new table provides detailed info on stolen credentials, domains, and IP addresses. Users can assess the breach scope and identify compromised credentials. Tracing credentials back to endpoints allows organizations to take targeted actions like isolation or cleansing.

Advanced Threat Analysis

Filter credential-stealing malware data for more precise analysis of its impact. By identifying attack origins using IP addresses, users, and OS data, organizations can prioritize defenses and track the spread within their networks.

Contextual intelligence for Decision-Making

The visual comparison chart distinguishes between full email and username breaches, revealing infostealer capture patterns. Full email breaches may indicate broader phishing risks, while username breaches suggest targeted compromises. Data freshness informs response priority—recent breaches require immediate action, older data guides long-term strategy.

Proactive Threat Mitigation

These updates transform raw data into actionable intelligence, enabling security teams to proactively mitigate infostealer threats. Organizations can now anticipate potential breaches, prioritize remediation, and allocate resources effectively

How it works


The new features are integrated seamlessly into the existing My Credential Exposure dashboard, allowing for easy access and analysis of enhanced data:

  • Navigating the Dashboard: Go to ‘Account Takeover’ > ‘My Credential Exposure’ tab in the Ignite platform.
  • Applying Filters: Use the filter bar to narrow data by IP address, machine user, machine OS, and credential-stealing malware.
  • Visual Comparisons: Scroll to the visual analytics section for the username vs. email comparison tile, which highlights potential risks.
  • Reviewing Detailed Credential Data: The new table at the bottom of the dashboard provides comprehensive details on credential sets, affected domains, IP addresses, and machine information, along with a freshness indicator.

By leveraging these enhancements, organizations gain a deeper understanding of infostealer threats and can take informed actions to protect their credential security. This helps strengthen their security posture and safeguard valuable assets.

See it in action.