Confirmed breach
IRHigh-confidence breach alerts.
Installs immediately if you are signed in.
Security breach alerts
Use these to track confirmed breaches, active exploitation, ransomware, and supply-chain compromise with cleaner trigger wording.
High-confidence breach alerts.
Installs immediately if you are signed in.
Active exploitation signals.
Installs immediately if you are signed in.
High-impact sector alert.
Installs immediately if you are signed in.
Dependency risk early warning.
Installs immediately if you are signed in.
The strongest watches separate confirmed harm from rumor. Name the victim class, the signal you care about, and the threshold for action, such as active exploitation, broad customer impact, or a leak-site claim against a specific sector.
Security teams rarely operate in isolation. If a breach could spill into downtime, keep a companion watch on outage alerts so the notification stream reflects both security and service impact.
Do not collapse every security concern into one alert. A zero-day with active exploitation, a confirmed customer-impacting breach, a leak-site post, and a supply-chain compromise are different operational problems. They deserve different wording and different escalation paths.
If you run security for a specific environment, add the vendors, platforms, or sectors that matter to you. A healthcare ransomware watch, an OSS supply-chain watch, and a cloud control-plane watch are much easier to trust than a single generic “cyber attack” alert.
Read the breach early-warning guide or open the full alert template library.