Skip to content
datasheet

Platform Modules

Web, Social Media, Marketplace, App Store, Dark Web, Abuse Mailbox

Setting Up Your Organization’s External Abuse Mailbox

This guide is for organizations that don’t yet have an external abuse mailbox but need to set one up in order to use the External Abuse Mailbox module. An abuse mailbox is a dedicated email address where your customers, partners, and other third-party users can forward dubious messages. These instructions walk you through creating a […]

Threat Types, Intents, and Dispositions for Emails

Discover how emails are categorized in the External Abuse Mailbox module and what those categories reveal about how bad actors are attempting to exploit your customers. Understanding the categories helps you recognize threats and gain insight into the tactics attackers use. Knowing how each threat is evaluated enables security teams to evaluate, prioritize, and take […]

Getting Started: External Abuse Mailbox Module

Bolster’s External Abuse Mailbox module automates abuse email triage, helping security teams detect, prioritize, and mitigate threats. This guide walks through setup, including configuring email forwarding, adding brand assets, and setting user roles to improve threat detection and streamline response.

Abuse Mailbox Dashboard

Bolster’s Abuse Mailbox Dashboard provides real-time analytics on phishing, scam detection, and takedown progress. Identify trends, analyze malicious emails, and track mitigation efforts. See email threat breakdowns, takedown times, and attack patterns to take action. Learn how security teams use this dashboard to streamline threat response and protect their brand from evolving cyber risks.

Managing Reported Emails

Learn how to review and take action on reported emails in Bolster’s External Abuse Mailbox module. This guide covers assessing forwarded customer reports, identifying threats, tracking takedown progress, and mitigating phishing and scam risks. Use dashboard insights, export data, and escalate issues to streamline security response and protect your brand from evolving cyber threats.

Setting Up Email Forwarding

Set up email forwarding for Bolster’s External Abuse Mailbox module to ensure phishing and scam reports are automatically processed. This how-to guide covers configuring Gmail and Outlook forwarding, verifying setup, and troubleshooting common issues. Automating this process helps security teams detect threats faster and streamline response.

Adding Dark Web Search Terms

Learn how to Add Search Terms so Bolster’s Dark Web module can monitor for specific leaked data, phishing kits, and other threats. Define info types, sources, and keyword values to identify relevant findings. Includes Boolean operators, format guidelines, and examples to help security teams detect breaches and streamline triage.

Dark Web Dashboard

Bolster’s Dark Web Dashboard delivers real-time threat intelligence on exposed credentials, phishing kits, source code, and other risks on the dark web. Security teams can see filtered findings, drill down for details, and track emerging threats. This article includes sample workflows to help teams investigate and mitigate threats using Bolster’s dark web monitoring tools.

Managing Dark Web Search Findings

Track and manage dark web threats with Bolster. Surface exposed credentials, stolen data, and threat actor activity from anonymous sources like Tor and Telegram. Review findings, assign follow-up, and mark resolved items to stay organized. Help your security team focus on the threats that matter most across hidden channels.

Setting Up Dark Web Detection Workflows

Learn in detail how to set up detection for common threat types using Bolster’s Dark Web module. This guide walks through setup steps for finding and monitoring compromised accounts, stolen credit cards, phishing kits, executive doxing, and leaked source code. Use search terms and playbook automation to streamline threat detection and take action across anonymous dark web sources.

buyers-guide
Buyer’s Guide

Buyer’s Guide: Purchasing a Brand Security Solution

AI Security for Email One-Pager
AI Security for Email One-Pager

Bolster’s AI Security for Email: The Protection Your Need in One Page

bs-2024-election-report
2024 Presidential Election Report

Discover the latest phishing and online scams threatening the democratic process

2024 Mid-Year Phishing Report

Protect Your Business from Evolving Phishing and Election Scams

bs-stop-the-steal
Master BEC Defense

Protect Your Business from BEC Scams with Our Latest Whitepaper

Domain Risk Report

Want Visibility into Your Domain Threats? Get Your Free Domain Risk Report Now!